Business Email Compromise (BEC) Attacks Jump 200 Percent from April to May

Business Email Compromise (BEC) Attacks Jump 200 Percent from April to May

by Filip Truta, from Business Insights , on 01.07.2020

New data shows a sharp increase in monthly business email compromise (BEC) attacks focused on invoice or payment fraud. read more

Singapore Starts Using Bluetooth-Enabled Contact Tracing Tokens

Singapore Starts Using Bluetooth-Enabled Contact Tracing Tokens

by Silviu STAHIE, from IoT Security Insights , on 30.06.2020

A small contact tracker that uses Bluetooth is being distributed in Singapore to people who don’t want to use a contact tracing app on their phones or who don’t have smartphones or have limited mobility. The use of contact tracing apps is experiencing some resistance in the general population due to privacy concerns. A contact ... The post Singapore Starts Using Bluetooth-Enabled Contact Tracing Tokens appeared first on Bitdefender. read more

Untrained and Malicious Users Lead Concerns among IT Professionals in the UK

Untrained and Malicious Users Lead Concerns among IT Professionals in the UK

by Alina Bizga, from Business Insights , on 30.06.2020

A new report published by KnowBe4 delves into the top security challenges and issues that IT professionals and UK-based organizations face, including attack types, security initiatives and organizational limits. read more

Security Professionals Say COVID-19 Crisis Increased Cyber Threat to Enterprise Systems

Security Professionals Say COVID-19 Crisis Increased Cyber Threat to Enterprise Systems

by Silviu Stahie, from Business Insights , on 30.06.2020

A survey of some of the top IT security professionals who participated in the annual Black Hat USA conference underlined a key concern, with companies overwhelmingly believing that the COVID-19 pandemic increases cyberthreats. read more

Enterprises Bring Security Bad Habits Along With Their Digital Transformation Efforts

Enterprises Bring Security Bad Habits Along With Their Digital Transformation Efforts

by Business Insights , on 30.06.2020

As enterprises continue with their digital transformations by automating their manual workflows, moving existing applications to the cloud, and developing and deploying new applications at a record pace, they’re also rapidly increasing the complexity in their environments, and as a result security controls and processes that should be in place continue to slip. read more

Satori Botnet Developer and Operator Gets 13 Months in Prison

Satori Botnet Developer and Operator Gets 13 Months in Prison

by Silviu STAHIE, from IoT Security Insights , on 29.06.2020

One of the operators of the Satori botnet was sentenced to 13 months in the United States to develop distributed denial-of-service (DDoS) botnets after he pleaded guilty to one count of fraud and related activity in connection with computers. Botnets are networks of connected devices and computers, controlled by people either rent them or use ... The post Satori Botnet Developer and Operator Gets 13 Months in Prison appeared first on Bitdefender. read more

Philips Unveils Vulnerability Affecting Ultrasound Medical Devices

Philips Unveils Vulnerability Affecting Ultrasound Medical Devices

by Silviu STAHIE, from IoT Security Insights , on 26.06.2020

A vulnerability was identified in six different Philips Ultrasound medical systems, which would allow an attacker to view or modify information. Medical IoT devices are an essential part of the IoT ecosystem, but they are more sensitive to vulnerabilities than regular devices. Vulnerabilities in medial IoT could literally make the difference between life and death, ... The post Philips Unveils Vulnerability Affecting Ultrasound Medical Devices appeared first on Bitdefender. read more

Nearly 80,000 Printers Are Exposed to Malicious Attacks Daily, New Research Shows

Nearly 80,000 Printers Are Exposed to Malicious Attacks Daily, New Research Shows

by Alina Daniela BIZGA, from IoT Security Insights , on 24.06.2020

An average of 80,000 printers are exposed online via IPP (Internet Printing Protocol) daily, according to a new study from the Shadowserver Foundation. The non-profit security organization, which has been participating in the Connecting Europe Facility funded project named VARIoT (Vulnerability and Attack Repository for IoT) since July 2019, aims to expand its “Internet wide ... The post Nearly 80,000 Printers Are Exposed to Malicious Attacks Daily, New Research Shows appeared first on Bitdefender. read more

Apple’s New CarKey Feature Will Let People Unlock and Start Cars with Phones

Apple’s New CarKey Feature Will Let People Unlock and Start Cars with Phones

by Silviu STAHIE, from IoT Security Insights , on 24.06.2020

Apple is preparing to populate the IoT ecosystem with a new function in iOS 14 to allow people to use their phones as car keys. Using a phone to open and start the car seems an obvious progression for IoT devices, and it makes sense, even from a security point of view. Banking apps use ... The post Apple’s New CarKey Feature Will Let People Unlock and Start Cars with Phones appeared first on Bitdefender. read more

Cisco Nexus Switches Get an Update to Fix Important Vulnerability

Cisco Nexus Switches Get an Update to Fix Important Vulnerability

by Silviu STAHIE, from IoT Security Insights , on 23.06.2020

Cisco released an update for its Nexus series of datacenter switches running the proprietary Cisco NX-OS Software, fixing a vulnerability that would have let attackers cause a denial of service (DoS) condition on the device. We often imagine the Internet of Things ecosystem as a world full of cool and interesting gadgets that use their ... The post Cisco Nexus Switches Get an Update to Fix Important Vulnerability appeared first on Bitdefender. read more

<< Prev Next >>