7GB of Medical Data Publicly Exposed Thanks to Misconfigured AWS S3 Bucket

7GB of Medical Data Publicly Exposed Thanks to Misconfigured AWS S3 Bucket

by Luana PASCU, from HotForSecurity , on 20.09.2018

A misconfigured AWS S3 bucket belonging to Medcall Healthcare Advisors exposed sensitive patient records as well as confidential doctor-patient audio discussions. For some reason, the story about the misconfigured AWS S3 bucket keeps repeating itself. Verizon, the Pentagon, Toyota, Tesla and the NSA are among the companies that have fallen victim to the same data [and#8230;] read more

No Matter How Old the Vulnerability, Hackers Will Exploit It

No Matter How Old the Vulnerability, Hackers Will Exploit It

by Ionut ILASCU, from IoT Security Insights , on 20.09.2018

Malware that targets Internet-of-Things devices is not finicky about the methods it uses to infect the systems; the main concern is how large an army it can raise. Starting from this premise, cybercriminals seek vulnerabilities that provide a huge yield, no matter how old they are. A recent trend in IoT botnet malware is to ... The post No Matter How Old the Vulnerability, Hackers Will Exploit It appeared first on Bitdefender. read more

Amazon Hit from Within, Employees Leak Proprietary Data for Profit

Amazon Hit from Within, Employees Leak Proprietary Data for Profit

by Business Insights , on 20.09.2018

Insider threats are nothing to joke about -- they are a real danger to companies worldwide, who often neglect them. In fact, they rank among the top six threats of 2018, according to statistics. A company will spend at least $8 million yearly on insider threats, the Ponemon Institute has found. read more

FDA to demand medical smart device makers undertake strict cybersecurity checks before selling to HCPs

FDA to demand medical smart device makers undertake strict cybersecurity checks before selling to HCPs

by Filip TRUTA, from IoT Security Insights , on 19.09.2018

The U.S. Department of Health and#38; Human Services Office of Inspector General (OIG) has proposed the Food and#38; Drug Administration (FDA) change its internal processes to better address cybersecurity of medical devices before approving their sale to healthcare providers (HCPs). Healthcare is among the verticals most targeted by cybercriminals. In the case of medical smart ... The post FDA to demand medical smart device makers undertake strict cybersecurity checks before selling to HCPs appeared first on Bitdefender. read more

Researchers find new financial malware targeting banking customers in Brazil

Researchers find new financial malware targeting banking customers in Brazil

by Filip TRUTA, from HotForSecurity , on 19.09.2018

Bad actors are targeting businesses in Brazil using clever social engineering tactics and camouflaged malware to bypass strong authentication and security controls and ultimately take over bank accounts. Using a Trojan disguised as a legitimate banking module, the scammers seek login credentials to the victim’s banking account. IBM X-Force researchers dubbed the malware used in [and#8230;] read more

Amazon wants to release line of Alexa-controlled home hardware

Amazon wants to release line of Alexa-controlled home hardware

by Luana PASCU, from IoT Security Insights , on 19.09.2018

If you haven’t been caught up with the smart assistant craze yet, soon enough you won’t be able to get away from connected devices that can be controlled with voice assistants. This is what Amazon is striving to implement through its most recent hardware initiative, and heavy recent interest in IoT technologies. and#8220;We want customers ... The post Amazon wants to release line of Alexa-controlled home hardware appeared first on Bitdefender. read more

Interview: Casper Klynge, the world’s first Tech Ambassador, on dealing with global tech issues, setting screen time for his kids

Interview: Casper Klynge, the world’s first Tech Ambassador, on dealing with global tech issues, setting screen time for his kids

by Cristina POPOV, from IoT Security Insights , on 19.09.2018

”Techplomacy” is a word you will not find in the dictionary, yet. The concept emerged last year when the Danish Ministry for Foreign Affairs created a Tech Embassy and named a Tech Ambassador and#8211; Casper Klynge.     The objective was to create a dialogue about how artificial intelligence, machine learning, the internet of things, data, ... The post Interview: Casper Klynge, the world’s first Tech Ambassador, on dealing with global tech issues, setting screen time for his kids appeared first on Bitdefender. read more

“Peekaboo” zero-day lets hackers view and alter surveillance camera footage

“Peekaboo” zero-day lets hackers view and alter surveillance camera footage

by Graham CLULEY, from IoT Security Insights , on 19.09.2018

Hundreds of thousands of security cameras are believed to be vulnerable to a zero-day vulnerability that could allow hackers to spy on feeds and even tamper with video surveillance recordings. Security researchers at Tenable revealed their discovery in a blog post this week, explaining how they had uncovered a critical remote code execution vulnerability in ... The post and#8220;Peekabooand#8221; zero-day lets hackers view and alter surveillance camera footage appeared first on Bitdefender. read more

Yahoo settles for $47 million in litigation following data breach of 3 billion accounts

Yahoo settles for $47 million in litigation following data breach of 3 billion accounts

by Luana PASCU, from HotForSecurity , on 19.09.2018

Everyone remembers the Yahoo breach and#8212; it was simply historical and created mass hysteria at the time. The company ultimately confirmed in late 2017 that, following an alleged state-sponsored attack, all user accounts had been breached – that is 3 billion users. If you can’t really put your finger on what that number means, 3 [and#8230;] read more

Your Business Should Be More Afraid of Phishing than Malware

Your Business Should Be More Afraid of Phishing than Malware

by Graham Cluley, from Business Insights , on 19.09.2018

The headlines love to talk about sophisticated hacking gangs, exploiting zero-day vulnerabilities to break their way into businesses and steal corporate data. read more

Next >>