by Luana PASCU, from HotForSecurity , on 12.03.2018
Canadian researchers from human rights organization Citizen Lab uncovered a major computer espionage operation spreading across Turkey, Egypt and, indirectly, Syria. The operation, which started in 2017, is a nation-state-level network injection to deliver spyware. According to the research, deep packet inspection (DPI) middleboxes, hardware developed by Canadian-American company SandVine, were used by local ISPs [and#8230;] read more
by Ionut ILASCU, from IoT Security Insights , on 12.03.2018
A modern car’s resistance to hacking has been once again tested by security researchers, who have built a device to spy on internal communications and deliver commands to the vehicle. The piece of hardware has GSM support, allowing an attacker to activate available payloads by sending an SMS from anywhere in the world. An automobile ...
The post Hardware Backdoor for Remote Control over Cars appeared first on Bitdefender.
by Business Insights , on 12.03.2018
As enterprises bridge their adoption patterns for public cloud from isolated pilot projects to fully scaled environments, they're going to need to get serious about adjusting their cybersecurity strategy and architecture to accordingly. According to the thinkers at McKinsey and Company, that sea change needs to start now. In a new report out last month by the consulting firm, enterprises are finally doubling down on their public cloud experiments over the last decade. And that means an impending cascade of public cloud usage in critical infrastructure that previously remained entrenched in the on-prem world. read more
by Luana PASCU, from IoT Security Insights , on 09.03.2018
Disruptive technologies such as the internet of things, artificial intelligence and blockchain have amazing potential, but CIOs in local government first have to pinpoint the problems their citizens struggle with. Once they determine the needs, they can use these technologies to solve problems based on data analytics. Successful smart city deployment might depend on citizen ...
The post User engagement is vital in smart city development, Gartner says appeared first on Bitdefender.
by Filip Truta, from Business Insights , on 09.03.2018
Ransomware, the prolific malware that locks down computer files until the victim pays to regain access, remains the fastest-growing cyber threat, targeting users from the regular Joe to entire corporate networks. read more
by Graham CLULEY, from HotForSecurity , on 09.03.2018
You may think your Windows 10 computer is locked, but is it really? Israeli researchers Tal Be’ery and Amichai Shulman have discovered a way of just using voice commands to make locked Windows 10 computers visit a website under the control of malicious hackersand#8230; and potentially install malware. The problem lies in Cortana, the voice [and#8230;] read more
by Filip TRUTA, from IoT Security Insights , on 08.03.2018
The UK government has issued a report listing new guidelines for Internet of Things (IoT) manufacturers who plan to do business in the country. The administration wants Internet-connected products to be secured “by design,” shifting responsibility to the vendor and away from consumers. The document, essentially a code of practice, is still just a draft. ...
The post UK has had enough of rogue gadgets; wants IoT vendors to secure devices ‘by design’ appeared first on Bitdefender.
by Luana PASCU, from HotForSecurity , on 08.03.2018
The US Department of Homeland Security is pretty bad at digitally protecting national security interests, says an audit report released on March 7 by the agency’s watchdog, the Office of Inspector General (OIG). According to the findings, the agency is working with systems running on old, outdated software that haven’t had a security patch in [and#8230;] read more
by Business Insights , on 08.03.2018
The U.S. Securities and Exchange Commission (SEC) put public companies on warning that they need to get better about how and when they disclose not just breaches but material cyber risks to investors. The instructions were part of an updated guidance on breach disclosure from the SEC meant to protect investors and bring greater clarity to what the regulatory board expects from public companies when it comes to how they handle information security transparency. read more
by Filip TRUTA, from HotForSecurity , on 07.03.2018
Enterprises and small-to-medium businesses (SMEs) worldwide in 2018 are bolstering their security strategies based on Europeand#8217;s upcoming data protection regulation, with a new poll showing more than half of organizations pledge to add identity and access security solutions. The Versasec study found Europeand#8217;s General Data Protection Regulation (GDPR) is beginning to seriously affect companies’ approach [and#8230;] read more