Bitdefender BOX Technology Teardown – Sensitive Data Protection

Bitdefender BOX Technology Teardown – Sensitive Data Protection

by Loredana BOTEZATU, from IoT Security Insights , on 14.11.2019

We know technology can sound overwhelming, particularly when it comes to cybersecurity. So we strive to make it accessible and controllable at the press of a button. This article – part of a series – aims to explain several of the innovative Bitdefender technologies that constitute the building blocks of Bitdefender BOX. The Internet is ... The post Bitdefender BOX Technology Teardown – Sensitive Data Protection appeared first on Bitdefender. read more

Amazon Echo Show 5 Hacked by Researchers, Earning them $60,000

Amazon Echo Show 5 Hacked by Researchers, Earning them $60,000

by Silviu STAHIE, from IoT Security Insights , on 13.11.2019

A couple of security researchers figured out a way to hack the Amazon Echo Show 5 and seize complete control, earning them a prize of $60,000. On the first day of Pwn2Own Tokyo 2019, researchers of the Fluoroacetate team hacked the personal assistant using an integer overflow in JavaScript. “The Fluoroacetate duo returned for our ... The post Amazon Echo Show 5 Hacked by Researchers, Earning them $60,000 appeared first on Bitdefender. read more

Facebook App for iOS Caught Accessing Camera in Background

Facebook App for iOS Caught Accessing Camera in Background

by Silviu STAHIE, from HotForSecurity , on 13.11.2019

iPhone users reported that Facebook was opening the primary camera when the app was in use, leading to speculation that this function was being used to spy on people. Facebook was quick to say it was nothing more than a bug. Some iPhone users noticed that the camera on their phone was open when they [and#8230;] read more

The Underworld Economy

The Underworld Economy

by Liviu Arsene, from Business Insights , on 13.11.2019

Imagine a world in which you could simply click onto a website to buy drugs, weapons, fake IDs, malicious software and ‘how to’ guides for building AK47s. In just a button press, you could own just about any illegal item you can think of. In the realm of the dark markets, this world, or underworld, is very much a reality. read more

Fatal Heart Attacks Increase at Hospitals After Data Breaches, Research Shows

Fatal Heart Attacks Increase at Hospitals After Data Breaches, Research Shows

by Silviu STAHIE, from IoT Security Insights , on 12.11.2019

Hospitals register a higher death rate for heart attack patients for up to three years after suffering a data breach in online attacks, according to a US study published in the latest issue of Health Services Research. While some might leap to the conclusion that Internet of Things devices or other medical equipment were altered ... The post Fatal Heart Attacks Increase at Hospitals After Data Breaches, Research Shows appeared first on Bitdefender. read more

UK Labour Party Servers Hit by DDOS from Russia and Brazil

UK Labour Party Servers Hit by DDOS from Russia and Brazil

by Silviu STAHIE, from HotForSecurity , on 12.11.2019

A complex Distributed Denial of Service (DDoS) attack hit the UK Labour Party’s server infrastructure, but failed to compromise any system or to steal any data. The Labor Party’s executive director of elections, Niall Sookoo, said that their security systems identified a large-scale attack designed to take the entire system offline. Fortunately, the server managed [and#8230;] read more

Attackers Still Finding Plenty of Systems Vulnerable to Bluekeep

Attackers Still Finding Plenty of Systems Vulnerable to Bluekeep

by Silviu STAHIE, from HotForSecurity , on 12.11.2019

Despite the Microsoft-issued patch for BlueKeep, attackers are still exploiting the infamous vulnerability, underlining a problem with the way patches are applied in organizations and by individual users. The SANS Institute observed exploitation of BlueKeep vulnerability in real time for a few months. The researchers use a tool named Shodan to monitor honeypots intentionally exposed [and#8230;] read more

Cisco Fixes High-Risk Vulnerabilities in Some Small Business RV Series Routers

Cisco Fixes High-Risk Vulnerabilities in Some Small Business RV Series Routers

by Silviu STAHIE, from HotForSecurity , on 12.11.2019

A number of Cisco Small Business RV Series Routers series were found to be vulnerable to a couple of attacks, and Cisco was quick to explain what the vulnerabilities were and that the patches were issued. Cisco confirmed that command injection and arbitrary command execution vulnerabilities were found in routers series including RV016, RV042, RV042G, [and#8230;] read more

Cybersecurity Field Must More Than Double Qualified Staff to Meet Market Needs, Survey Shows

Cybersecurity Field Must More Than Double Qualified Staff to Meet Market Needs, Survey Shows

by Silviu Stahie, from Business Insights , on 12.11.2019

The lack of certified cybersecurity professionals is felt throughout the world, and the industry would need to more than double the number of staff to meet the market’s needs, according to a study by (ISC)². As it stands, the supply of qualified labor only meets around 40% of demand. read more

Most Cybersecurity Professionals Lack a Plan to Deal with Attacks on IoT Devices

Most Cybersecurity Professionals Lack a Plan to Deal with Attacks on IoT Devices

by Silviu STAHIE, from IoT Security Insights , on 11.11.2019

Only 40% of cybersecurity professionals know how to deal with attacks on IoT devices in their organization, new research from Neustar International Security Council (NISC) shows. Cybersecurity professionals need to plan for all types of intrusions in their organizations, and that includes threats towards IoT devices. But the new research by The International Cyber Benchmarks ... The post Most Cybersecurity Professionals Lack a Plan to Deal with Attacks on IoT Devices appeared first on Bitdefender. read more

<< Prev Next >>