September 28, 2022
Via: Help Net SecurityCloudflare announced the development of the Cloudflare Zero Trust SIM, a solution that secures every packet of data leaving mobile devices. With the Zero Trust SIM that Cloudflare is developing, organizations will be able to quickly and securely connect employee […]
October 9, 2020
Via: Threat PostA fresh variant of a sophisticated Android ransomware known as MalLocker locks up mobile devices – surfacing its ransom note when a user hits the Home button. According to research from Microsoft, MalLocker is spreading via malicious website downloads (disguised […]
November 8, 2019
Via: Help Net SecurityFewer than half (47%) of cybersecurity professionals have a plan in place to deal with attacks on their IoT devices and equipment, despite the fact that nine out of ten express concerns over future threats, according to the Neustar International […]
October 30, 2019
Via: Threat PostResearchers are on the hunt for the infection vector behind a mysterious mobile malware that has infected over 45,000 Android devices in the past six months. Researchers said they have detected a surge in detections of the malware, dubbed Xhelper, […]
October 25, 2019
Via: Threat PostA new information stealer, dubbed Raccoon, is rapidly gaining popularity with cybercriminals. In just a few months, researchers say the malware has already infected hundreds of thousands of devices across the world to rove through victims’ credit card data, email […]
June 20, 2019
Via: The HillA Senate committee on Wednesday advanced legislation aimed at securing government-purchased devices against cyber threats, a move that comes just weeks after a companion bill moved forward in the House. The Senate Homeland Security and Governmental Affairs Committee approved by […]
Cloud security, Network security, Security
June 6, 2019
Via: Threat PostInternet of things (IoT) device security continues to worry the tech industry – however, experts believe that the right type of global regulation could be key for ensuring security standards. The question is when those regulatory efforts will be fleshed […]
Access control, Cloud security, Security
May 24, 2019
Via: Threat PostKeeping track of user names and passwords sounds easy, but it is not. In a world where protected network resources are accessed by employees on mobile devices, outside contractors, web applications and internet of things (IoT) devices – passwords just […]
April 16, 2019
Via: Security IntelligenceWhere does “it” end? We can probably all agree that securing and protecting the devices that communicate with our networks is a fair definition of endpoint security. Similarly, these devices are one of the best places to start when figuring […]
December 19, 2018
Via: Hot for SecurityAfter Germany refused to ban Huawei devices due to a lack of strong evidence to support cyberespionage accusations, Huawei now demands Washington show evidence to support its fears. “There are no concerns about individual companies,” Peter Altmaier, German Federal Minister […]
December 4, 2018
Via: Help Net SecurityHospital cybersecurity is a pressing problem with unique challenges and incalculable stakes. The healthcare industry’s accelerating adoption of sophisticated networks, connected devices, and digital records has revolutionized clinical operations and patient care but has also left modern hospitals acutely vulnerable […]
October 2, 2018
Via: DataBreach TodayIn its ongoing quest to improve the state of medical device cybersecurity, the Food and Drug Administration has announced a number of key moves – including the release of a new security playbook, plans to leverage information sharing and analysis […]
July 26, 2018
Via: William PalmerThe growing array of devices that can be connected to the internet causes consumers to be increasingly susceptible to cybercrime. Every smart TV or networked lightbulb we set up in our home or office can become a silent soldier sent […]
June 15, 2018
Via: James HughesWith the cyber threats faced by mobile phone users uprising at an alarming rate, app permissions became a crucial step in securing our devices. In 2017, Kaspersky Lab detected almost 6 million malicious installation packages and more than 94.000 mobile […]
May 23, 2018
Via: Threat PostA pen-tester has found six vulnerabilities in Dell EMC RecoverPoint devices, including a critical remote code execution flaw that could allow total system compromise. EMC RecoverPoint is a disaster recovery tool that can be used to back up local and […]
April 19, 2018
Via: Threat PostResearchers have identified a new iOS vulnerability called “trustjacking,” which exploits a feature called iTunes Wi-Fi Sync to give attackers persistent control over victims’ devices. Symantec researchers presented the vulnerability during a session at RSAC this week and said the […]
March 30, 2018
Via: The HillApple is offering a new privacy feature on all of its devices that will inform users whenever their data is being collected by one of the company’s services. As part of their latest software update, Apple will start showing users […]
Vulnerabilities, Wireless security
March 30, 2018
Via: Security WeekCisco has patched more than 30 vulnerabilities in its IOS software, including a critical remote code execution flaw that exposes hundreds of thousands – possibly millions – of devices to remote attacks launched over the Internet. A total of three […]
February 5, 2018
Via: Security WeekVulnerabilities that could allow unauthorized file deletion, unauthorized command execution and authentication bypass impacted WD (Western Digital) MyCloud devices, Trustwave reports. The vulnerabilities were discovered in the MyCloud personal storage device and were reported to Western Digital last year. The […]
January 8, 2018
Via: CSO OnlineOh good, there’s a plethora of vulnerabilities, including a hardcoded backdoor, in 12 Western Digital My Cloud network storage devices. If you have one, then you need to update the firmware ASAP, unless you actually want anyone at all across […]