If there’s no ‘free lunch,’ how about free coffee?

If there’s no ‘free lunch,’ how about free coffee?

by Ionut ILASCU, from IoT Security Insights , on 19.08.2019

With a couple of hours to spare earlier this year at a French underground event for hackers, security researcher Baptiste Robert opted for a cup of coffee from a vending machine. And a couple of hours was just enough time to get it – hacker style. When he saw he could pay by mobile phone ... The post If there’s no ‘free lunch,’ how about free coffee? appeared first on Bitdefender. read more

When it Comes to Application Security, Banks Pay Little Interest

When it Comes to Application Security, Banks Pay Little Interest

by Business Insights , on 16.08.2019

One might think financial institutions, such as banks, would have formidable levels of application security. Unfortunately, if one thought that, one would be wrong. According to an analysis by application security vendor ImmuniWeb, a startling 97 out of 100 of the world’s largest banks are vulnerable to web and mobile attacks. read more

Report: Nashville company pays ex-employee ransom installments only to stall him until the cops make the bust

Report: Nashville company pays ex-employee ransom installments only to stall him until the cops make the bust

by Filip TRUTA, from HotForSecurity , on 16.08.2019

A global phone insurance and tech support company headquartered in Nashville, Tennessee has resorted to paying ransom to an alleged ex-staffer after receiving emails claiming he stole private info of thousands of employees and more than a million customers. As reported by the Tennessean, Asurion isn’t entirely sure the attacker is an disgruntled ex-employee. However, [and#8230;] read more

Microsoft warns of wormable vulnerabilities in Windows

Microsoft warns of wormable vulnerabilities in Windows

by Graham CLULEY, from HotForSecurity , on 14.08.2019

On the second Tuesday of every month, regular as clockwork, Microsoft releases a bundle of security patches for its software and urges companies and home users to update their systems before vulnerabilities are exploited by malicious hackers. Sure enough on this monthand#8217;s Patch Tuesday, earlier this week, the company rolled out updates for its customers, [and#8230;] read more

Hackers steal 700,000 guest records from Choice Hotels

Hackers steal 700,000 guest records from Choice Hotels

by Filip TRUTA, from HotForSecurity , on 14.08.2019

Choice Hotels, a hospitality franchisor based in Maryland that owns chains such as Comfort Inn, MainStay Suites, Econo Lodge and Cambria Hotels, has suffered a cyber incident that exposed 700,000 guest records, including full names, addresses, phone numbers, email addresses and more. The breach, discovered by independent researcher Bob Diachenko and reported by Comparitech, went [and#8230;] read more

Companies increase IoT adoption and consider security implications

Companies increase IoT adoption and consider security implications

by Ionut ILASCU, from IoT Security Insights , on 14.08.2019

The Internet-of-Things technology first caught on with the consumer sector while companies kept a safe distance. Now, enterprise-level organizations have rapidly started to integrate IoT, encouraged by the positive impact on the business. Companies, however, also worry about the security implications of implementing and maintaining the technology. This worry, though, is far from being a ... The post Companies increase IoT adoption and consider security implications appeared first on Bitdefender. read more

How to Manage the Headache of Defending Industrial IT Infrastructures (Industrial IoT) – Part 2

How to Manage the Headache of Defending Industrial IT Infrastructures (Industrial IoT) – Part 2

by Bogdan Carlescu, from Business Insights , on 14.08.2019

This is the second of a two-part series of blog posts covering the challenges of securing Industrial IT infrastructures. This part covers: read more

Patch your internet-connected printer! Serious vulnerabilities discovered

Patch your internet-connected printer! Serious vulnerabilities discovered

by Graham CLULEY, from IoT Security Insights , on 14.08.2019

When you think of IoT chances are that you may picture all manner of gadgets and gizmos: ranging from smart doorbells which let you vet your visitors, to light bulbs which can change their hue with a simple click of an app, to hair straighteners that let you remotely control their temperature. But there is some ... The post Patch your internet-connected printer! Serious vulnerabilities discovered appeared first on Bitdefender. read more

Default passwords issue open invitation to hackers

Default passwords issue open invitation to hackers

by Ionut ILASCU, from IoT Security Insights , on 13.08.2019

It’s no secret that hackers focus on the weakest link on a network to gain entry. A group of skilled hackers did the same in their attempt to compromise a company and#8212; targeting a printer. Microsoft discovered the attack and determined the connected devices were used as an initial entry into the victim’s network. Because ... The post Default passwords issue open invitation to hackers appeared first on Bitdefender. read more

Best Practices for Cloud Workload Protection – Redesigning Cybersecurity for Cloud-First Businesses

Best Practices for Cloud Workload Protection – Redesigning Cybersecurity for Cloud-First Businesses

by Filip Truta, from Business Insights , on 13.08.2019

Legacy security designed to protect physical endpoints is no match for software-defined environments, such as cloud infrastructures. In fact, not even a modern endpoint security solution can, on its own, cover the full spectrum of cloud-workload protection requirements, use cases and workload types. This has opened the flood-gates to a new breed of cybersecurity solutions called “Cloud Workload Protection Platforms” (CWPPs), and the market is ripe for the picking, according to Gartner. read more

Next >>