79% of US parents say their kids were never cyberbullied, University of Phoenix finds

79% of US parents say their kids were never cyberbullied, University of Phoenix finds

by Luana PASCU, from IoT Security Insights , on 25.05.2018

A University of Phoenix study of US adults found that 60 percent acknowledge that cyberbullying has become more frequent recently, but when it comes to their own kids they are still unaware or not empathetic enough. As many as 79 percent claim their kids have not experienced cyberbullying behavior, which comes as no surprise. Bitdefender ... The post 79% of US parents say their kids were never cyberbullied, University of Phoenix finds appeared first on Bitdefender. read more

Understanding IoT Vulnerabilities: File Inclusion

Understanding IoT Vulnerabilities: File Inclusion

by Liviu ARSENE, from IoT Security Insights , on 25.05.2018

While the term “file inclusion” is somewhat self-explanatory – in the sense that it describes the ability to include a file – this is actually a common attack vector that an outsider uses to compromise IoT device security. Because some smart things often have lacking security, cybercriminals can sometimes control these devices remotely, by exploiting ... The post Understanding IoT Vulnerabilities: File Inclusion appeared first on Bitdefender. read more

Security Must Adjust as SDN Goes Mainstream

Security Must Adjust as SDN Goes Mainstream

by Business Insights , on 25.05.2018

After years of hype, 2018 may finally see the start of the mainstream adoption of software-defined networking (SDN). And with it, network virtualization and software defined data centers (SDDC) could be on the cusp of big breakthroughs. So say the results of the new research from Enterprise Management Associates (EMA). read more

Apple users can download all the data the company has on them

Apple users can download all the data the company has on them

by Luana PASCU, from HotForSecurity , on 24.05.2018

Unless you’ve been living under a rock this entire time, you’ve probably heard and already been blasted with emails related to GDPR, the EU’s data privacy regulation. Companies must keep customers informed about how their data is processed and assure them that they will from now on do their best to protect it. Apple is [and#8230;] read more

Where do schools come in when cyberbullies attack?

Where do schools come in when cyberbullies attack?

by Luana PASCU, from IoT Security Insights , on 24.05.2018

“Our school will not tolerate any action that undermines a person’s right to feel safe, respected, and to learn. This policy addresses conduct taking place on school grounds, at any school-sponsored activity, or outside school (if the bullying disrupts the school learning environment or possibly poses an imminent threat to the safety of any student).” ... The post Where do schools come in when cyberbullies attack? appeared first on Bitdefender. read more

Understanding IoT Vulnerabilities: HTTP Response Splitting

Understanding IoT Vulnerabilities: HTTP Response Splitting

by Liviu ARSENE, from IoT Security Insights , on 24.05.2018

With an estimate of more than 8 billion smart devices connected to the internet in 2017, security researchers have often found them to be vulnerable, remotely controllable by attackers, and even endangering user’s privacy. The nature of these vulnerabilities often varies in complexity, but the end result is usually the same: cyber criminals get to ... The post Understanding IoT Vulnerabilities: HTTP Response Splitting appeared first on Bitdefender. read more

2018 Is the Worst Year for Corporate Security; Executives Lack Cohesive Security Plan

2018 Is the Worst Year for Corporate Security; Executives Lack Cohesive Security Plan

by Business Insights , on 24.05.2018

Security executives fear cyberattacks will heavily target critical infrastructures in the near future, but they don’t seem to be doing much about enforcing security policies that also cover IoT devices. Despite the major threat they pose, connected devices have so far been overlooked in security policies. It appears that in general, in spite of the increasing awareness of high-profile cyberattacks and threats, enterprises tend to look the other way rather than invest properly in a cybersecurity strategy. read more

EDR and Cloud Workload Security on the Agenda for Bitdefender at Infosecurity EUROPE

EDR and Cloud Workload Security on the Agenda for Bitdefender at Infosecurity EUROPE

by Liviu Arsene, from Business Insights , on 23.05.2018

What are your plans for 5-7 June 2018 ? If you are a security professional attending Infosecurity Europein London, we'dbe delightedto meet with you, answer your questions and offer our insights into the latest cyber security trends. read more

800,000 DrayTek routers at risk of DNS hijacking attack – update your firmware!

800,000 DrayTek routers at risk of DNS hijacking attack – update your firmware!

by Graham CLULEY, from IoT Security Insights , on 23.05.2018

Router manufacturer DrayTek has issued a warning that several of its wireless routers are at risk of exploitation by hackers, after a vulnerability was discovered that could let an attacker remotely change the devices' DNS and DHCP settings. What that means is that a criminal could redirect web traffic via a rogue DNS server under ... The post 800,000 DrayTek routers at risk of DNS hijacking attack and#8211; update your firmware! appeared first on Bitdefender. read more

Most Companies Still Unprotected Against 10-Year-Old Wireless Vulnerabilities

Most Companies Still Unprotected Against 10-Year-Old Wireless Vulnerabilities

by Filip Truta, from Business Insights , on 23.05.2018

The Internet of Things may be mostly a consumer-facing phenomenon, but businesses too have become swayed by the IoT sensation. And, like regular users, they are starting to feel the heat caused by unsecured IoT devices. read more

Next >>