Live News

Bitdefender Labs cracks latest GandCrab – over 20,000 victims already saved. Get the new tool ›

Successful Convergence of IT and Operational Technology will be Vital for Strong Cyber Security

Successful Convergence of IT and Operational Technology will be Vital for Strong Cyber Security

by Razvan Muresan, from Business Insights , on 18.03.2019

The Internet of Things (IoT) and Industrial IoT represent a massive new cyber security challenge for many organizations, vastly expanding the potential attack surface because of the greatly increased number of end point devices in use. read more

Facebook Faces Criminal Investigation over Data Handling Partnerships

Facebook Faces Criminal Investigation over Data Handling Partnerships

by Luana PASCU, from HotForSecurity , on 18.03.2019

Facebook Faces Criminal Investigation over Data Handling Partnerships Facebook’s troubles seem never-ending, as the company now faces a criminal investigation by federal prosecutors for its data-sharing practices and partnerships with global tech companies, writes the New York Times. More than 150 companies including Netflix, Spotify, Apple, Microsoft, Sony and Amazon have apparently “cut sharing deals” [and#8230;] read more

‘Our faces are our identities’ – U.S. senators draft bill to combat irresponsible face ID collection in public places

‘Our faces are our identities’ – U.S. senators draft bill to combat irresponsible face ID collection in public places

by Filip TRUTA, from IoT Security Insights , on 18.03.2019

Two members of the Senate Committee on Commerce, Science, and#38; Transportation this week introduced the Commercial Facial Recognition Privacy Act of 2019, a proposal to prohibit commercial entities from collecting facial data without the customer’s express consent. Acknowledging that facial recognition has been used for security and surveillance applications for decades, U.S. Senators Roy Blunt ... The post ‘Our faces are our identities’ – U.S. senators draft bill to combat irresponsible face ID collection in public places appeared first on Bitdefender. read more

Remote Access Tool Enables Code Execution on Windows IoT Core Devices

Remote Access Tool Enables Code Execution on Windows IoT Core Devices

by Ionut ILASCU, from IoT Security Insights , on 18.03.2019

A new tool released to the public allows remote attackers to run commands on gadgets using Windows 10 IoT Core and gain control over them. The utility takes advantage of an unprotected interface with remote administration capabilities, which serves for testing drivers and hardware on IoT devices. Windows 10 IoT core is Microsoft’s operating system ... The post Remote Access Tool Enables Code Execution on Windows IoT Core Devices appeared first on Bitdefender. read more

DARPA to Develop $10 Million Open Source Voting System

DARPA to Develop $10 Million Open Source Voting System

by Luana PASCU, from HotForSecurity , on 15.03.2019

The US election might be different in 2020 thanks to a project by DARPA (Defense Advanced Research Projects Agency), the US Department of Defense research division, aiming at bullet-proofing voting machines by moving away from proprietary software that can’t be properly evaluated for bugs, writes Motherboard. $10 million is invested in creating an unhackable, fully [and#8230;] read more

Chinese government falls victim to GandCrab 5.2 ransomware

Chinese government falls victim to GandCrab 5.2 ransomware

by Filip TRUTA, from HotForSecurity , on 15.03.2019

Allegations that China is in the crosshairs of North Korean hackers have arisen after the discovery of ransomware-laden emails hitting the inboxes of government departments. The emails contain version 5.2 of the GandCrab ransomware concealed as an archive named “03-11-19.rar.” China’s National Network and Information Security Information Center has informed the country’s provincial government that [and#8230;] read more

Addressing the Human Error Causes of Security Breaches

Addressing the Human Error Causes of Security Breaches

by Razvan Muresan, from Business Insights , on 15.03.2019

Cyber security breaches can come from a wide variety of sources: Hackers out to exploit vulnerabilities and make money or wreak havoc; nation states looking to gain an economic advantage; competitors aiming to steal intellectual property; and disgruntled employees plotting to cause damage at their companies—to name a few. read more

Google Takes Down 2.3 Billion Ads, Almost 60 Million Phishing Scams

Google Takes Down 2.3 Billion Ads, Almost 60 Million Phishing Scams

by Luana PASCU, from HotForSecurity , on 14.03.2019

Google’s bad ads report for 2018 is out, and according to Director of Sustainable Ads Scott Spencer, 2.3 billion non-compliant ads were taken down for violating policies, almost 1 billion fewer than the 3.2 billion ads detected in 2017. Many represented malvertising and phishing scams for tech support, bail bonds, garage doors and ticket resellers, [and#8230;] read more

Verizon Study Shows Mobile Devices among Top Entry Points for Hackers, Ransomware Remains Most Successful Attack

Verizon Study Shows Mobile Devices among Top Entry Points for Hackers, Ransomware Remains Most Successful Attack

by Business Insights , on 14.03.2019

The Facebook data breach of 2018, probably the biggest of the year, illustrates better than any other example that no company, big or small, is immune to hackers. One would expect a company of Facebook’s size to sustain top-tier research and development for cybersecurity, but last year’s breaches prove it’s vulnerable anyway. read more

The Long Road Toward Building Secure Software at Enterprise Scale

The Long Road Toward Building Secure Software at Enterprise Scale

by Business Insights , on 13.03.2019

Since the rise of eCommerce in the late 1990s, enterprises have sought ways to improve the security of their software. Urgency to improve application security came when there was a wave of exploits and automated attacks in the form of worms and exploits started to hit. read more

Next >>