by Ionut ILASCU, from IoT Security Insights , on 19.08.2019
With a couple of hours to spare earlier this year at a French underground event for hackers, security researcher Baptiste Robert opted for a cup of coffee from a vending machine. And a couple of hours was just enough time to get it – hacker style. When he saw he could pay by mobile phone ...
The post If there’s no ‘free lunch,’ how about free coffee? appeared first on Bitdefender.
by Business Insights , on 16.08.2019
One might think financial institutions, such as banks, would have formidable levels of application security. Unfortunately, if one thought that, one would be wrong. According to an analysis by application security vendor ImmuniWeb, a startling 97 out of 100 of the world’s largest banks are vulnerable to web and mobile attacks. read more
by Filip TRUTA, from HotForSecurity , on 16.08.2019
A global phone insurance and tech support company headquartered in Nashville, Tennessee has resorted to paying ransom to an alleged ex-staffer after receiving emails claiming he stole private info of thousands of employees and more than a million customers. As reported by the Tennessean, Asurion isn’t entirely sure the attacker is an disgruntled ex-employee. However, [and#8230;] read more
by Graham CLULEY, from HotForSecurity , on 14.08.2019
On the second Tuesday of every month, regular as clockwork, Microsoft releases a bundle of security patches for its software and urges companies and home users to update their systems before vulnerabilities are exploited by malicious hackers. Sure enough on this monthand#8217;s Patch Tuesday, earlier this week, the company rolled out updates for its customers, [and#8230;] read more
by Filip TRUTA, from HotForSecurity , on 14.08.2019
Choice Hotels, a hospitality franchisor based in Maryland that owns chains such as Comfort Inn, MainStay Suites, Econo Lodge and Cambria Hotels, has suffered a cyber incident that exposed 700,000 guest records, including full names, addresses, phone numbers, email addresses and more. The breach, discovered by independent researcher Bob Diachenko and reported by Comparitech, went [and#8230;] read more
by Ionut ILASCU, from IoT Security Insights , on 14.08.2019
The Internet-of-Things technology first caught on with the consumer sector while companies kept a safe distance. Now, enterprise-level organizations have rapidly started to integrate IoT, encouraged by the positive impact on the business. Companies, however, also worry about the security implications of implementing and maintaining the technology. This worry, though, is far from being a ...
The post Companies increase IoT adoption and consider security implications appeared first on Bitdefender.
by Bogdan Carlescu, from Business Insights , on 14.08.2019
This is the second of a two-part series of blog posts covering the challenges of securing Industrial IT infrastructures. This part covers: read more
by Graham CLULEY, from IoT Security Insights , on 14.08.2019
When you think of IoT chances are that you may picture all manner of gadgets and gizmos: ranging from smart doorbells which let you vet your visitors, to light bulbs which can change their hue with a simple click of an app, to hair straighteners that let you remotely control their temperature. But there is some ...
The post Patch your internet-connected printer! Serious vulnerabilities discovered appeared first on Bitdefender.
by Ionut ILASCU, from IoT Security Insights , on 13.08.2019
It’s no secret that hackers focus on the weakest link on a network to gain entry. A group of skilled hackers did the same in their attempt to compromise a company and#8212; targeting a printer. Microsoft discovered the attack and determined the connected devices were used as an initial entry into the victim’s network. Because ...
The post Default passwords issue open invitation to hackers appeared first on Bitdefender.
by Filip Truta, from Business Insights , on 13.08.2019
Legacy security designed to protect physical endpoints is no match for software-defined environments, such as cloud infrastructures. In fact, not even a modern endpoint security solution can, on its own, cover the full spectrum of cloud-workload protection requirements, use cases and workload types. This has opened the flood-gates to a new breed of cybersecurity solutions called “Cloud Workload Protection Platforms” (CWPPs), and the market is ripe for the picking, according to Gartner. read more