by Luana PASCU, from HotForSecurity , on 20.09.2018
A misconfigured AWS S3 bucket belonging to Medcall Healthcare Advisors exposed sensitive patient records as well as confidential doctor-patient audio discussions. For some reason, the story about the misconfigured AWS S3 bucket keeps repeating itself. Verizon, the Pentagon, Toyota, Tesla and the NSA are among the companies that have fallen victim to the same data [and#8230;] read more
by Ionut ILASCU, from IoT Security Insights , on 20.09.2018
Malware that targets Internet-of-Things devices is not finicky about the methods it uses to infect the systems; the main concern is how large an army it can raise. Starting from this premise, cybercriminals seek vulnerabilities that provide a huge yield, no matter how old they are. A recent trend in IoT botnet malware is to ...
The post No Matter How Old the Vulnerability, Hackers Will Exploit It appeared first on Bitdefender.
by Business Insights , on 20.09.2018
Insider threats are nothing to joke about -- they are a real danger to companies worldwide, who often neglect them. In fact, they rank among the top six threats of 2018, according to statistics. A company will spend at least $8 million yearly on insider threats, the Ponemon Institute has found. read more
by Filip TRUTA, from IoT Security Insights , on 19.09.2018
The U.S. Department of Health and#38; Human Services Office of Inspector General (OIG) has proposed the Food and#38; Drug Administration (FDA) change its internal processes to better address cybersecurity of medical devices before approving their sale to healthcare providers (HCPs). Healthcare is among the verticals most targeted by cybercriminals. In the case of medical smart ...
The post FDA to demand medical smart device makers undertake strict cybersecurity checks before selling to HCPs appeared first on Bitdefender.
by Filip TRUTA, from HotForSecurity , on 19.09.2018
Bad actors are targeting businesses in Brazil using clever social engineering tactics and camouflaged malware to bypass strong authentication and security controls and ultimately take over bank accounts. Using a Trojan disguised as a legitimate banking module, the scammers seek login credentials to the victim’s banking account. IBM X-Force researchers dubbed the malware used in [and#8230;] read more
by Luana PASCU, from IoT Security Insights , on 19.09.2018
If you haven’t been caught up with the smart assistant craze yet, soon enough you won’t be able to get away from connected devices that can be controlled with voice assistants. This is what Amazon is striving to implement through its most recent hardware initiative, and heavy recent interest in IoT technologies. and#8220;We want customers ...
The post Amazon wants to release line of Alexa-controlled home hardware appeared first on Bitdefender.
by Cristina POPOV, from IoT Security Insights , on 19.09.2018
”Techplomacy” is a word you will not find in the dictionary, yet. The concept emerged last year when the Danish Ministry for Foreign Affairs created a Tech Embassy and named a Tech Ambassador and#8211; Casper Klynge. The objective was to create a dialogue about how artificial intelligence, machine learning, the internet of things, data, ...
The post Interview: Casper Klynge, the world’s first Tech Ambassador, on dealing with global tech issues, setting screen time for his kids appeared first on Bitdefender.
by Graham CLULEY, from IoT Security Insights , on 19.09.2018
Hundreds of thousands of security cameras are believed to be vulnerable to a zero-day vulnerability that could allow hackers to spy on feeds and even tamper with video surveillance recordings. Security researchers at Tenable revealed their discovery in a blog post this week, explaining how they had uncovered a critical remote code execution vulnerability in ...
The post and#8220;Peekabooand#8221; zero-day lets hackers view and alter surveillance camera footage appeared first on Bitdefender.
by Luana PASCU, from HotForSecurity , on 19.09.2018
Everyone remembers the Yahoo breach and#8212; it was simply historical and created mass hysteria at the time. The company ultimately confirmed in late 2017 that, following an alleged state-sponsored attack, all user accounts had been breached – that is 3 billion users. If you can’t really put your finger on what that number means, 3 [and#8230;] read more
by Graham Cluley, from Business Insights , on 19.09.2018
The headlines love to talk about sophisticated hacking gangs, exploiting zero-day vulnerabilities to break their way into businesses and steal corporate data. read more