by Razvan Muresan, from Business Insights , on 18.03.2019
The Internet of Things (IoT) and Industrial IoT represent a massive new cyber security challenge for many organizations, vastly expanding the potential attack surface because of the greatly increased number of end point devices in use. read more
by Luana PASCU, from HotForSecurity , on 18.03.2019
Facebook Faces Criminal Investigation over Data Handling Partnerships Facebook’s troubles seem never-ending, as the company now faces a criminal investigation by federal prosecutors for its data-sharing practices and partnerships with global tech companies, writes the New York Times. More than 150 companies including Netflix, Spotify, Apple, Microsoft, Sony and Amazon have apparently “cut sharing deals” [and#8230;] read more
by Filip TRUTA, from IoT Security Insights , on 18.03.2019
Two members of the Senate Committee on Commerce, Science, and#38; Transportation this week introduced the Commercial Facial Recognition Privacy Act of 2019, a proposal to prohibit commercial entities from collecting facial data without the customer’s express consent. Acknowledging that facial recognition has been used for security and surveillance applications for decades, U.S. Senators Roy Blunt ...
The post ‘Our faces are our identities’ – U.S. senators draft bill to combat irresponsible face ID collection in public places appeared first on Bitdefender.
by Ionut ILASCU, from IoT Security Insights , on 18.03.2019
A new tool released to the public allows remote attackers to run commands on gadgets using Windows 10 IoT Core and gain control over them. The utility takes advantage of an unprotected interface with remote administration capabilities, which serves for testing drivers and hardware on IoT devices. Windows 10 IoT core is Microsoft’s operating system ...
The post Remote Access Tool Enables Code Execution on Windows IoT Core Devices appeared first on Bitdefender.
by Luana PASCU, from HotForSecurity , on 15.03.2019
The US election might be different in 2020 thanks to a project by DARPA (Defense Advanced Research Projects Agency), the US Department of Defense research division, aiming at bullet-proofing voting machines by moving away from proprietary software that can’t be properly evaluated for bugs, writes Motherboard. $10 million is invested in creating an unhackable, fully [and#8230;] read more
by Filip TRUTA, from HotForSecurity , on 15.03.2019
Allegations that China is in the crosshairs of North Korean hackers have arisen after the discovery of ransomware-laden emails hitting the inboxes of government departments. The emails contain version 5.2 of the GandCrab ransomware concealed as an archive named “03-11-19.rar.” China’s National Network and Information Security Information Center has informed the country’s provincial government that [and#8230;] read more
by Razvan Muresan, from Business Insights , on 15.03.2019
Cyber security breaches can come from a wide variety of sources: Hackers out to exploit vulnerabilities and make money or wreak havoc; nation states looking to gain an economic advantage; competitors aiming to steal intellectual property; and disgruntled employees plotting to cause damage at their companies—to name a few. read more
by Luana PASCU, from HotForSecurity , on 14.03.2019
Google’s bad ads report for 2018 is out, and according to Director of Sustainable Ads Scott Spencer, 2.3 billion non-compliant ads were taken down for violating policies, almost 1 billion fewer than the 3.2 billion ads detected in 2017. Many represented malvertising and phishing scams for tech support, bail bonds, garage doors and ticket resellers, [and#8230;] read more
by Business Insights , on 14.03.2019
The Facebook data breach of 2018, probably the biggest of the year, illustrates better than any other example that no company, big or small, is immune to hackers. One would expect a company of Facebook’s size to sustain top-tier research and development for cybersecurity, but last year’s breaches prove it’s vulnerable anyway. read more
by Business Insights , on 13.03.2019
Since the rise of eCommerce in the late 1990s, enterprises have sought ways to improve the security of their software. Urgency to improve application security came when there was a wave of exploits and automated attacks in the form of worms and exploits started to hit. read more