Advertisement
Top

Tag: Device


Network security

IoT Security: The Cold, Hard Truth About Digital Device Defense

November 27, 2017

Via: Security Intelligence

With the IoT market on track to reach $800 billion this year and more than 2 billion connected devices already in the wild, it’s no surprise that Internet of Things (IoT) security is now a top priority for cutting-edge enterprises. […]


Mobile security

Samsung Pay Leaks Mobile Device Information

November 22, 2017

Via: Dark Reading

Researcher at Black Hat Europe will show how Samsung Pay’s security falls short and ways attackers could potentially bypass it. Mobile users installing Samsung Pay on their devices could have sensitive information stolen by attackers due to a newly discovered […]


Mobile security

Five Key Differences Between Personal and Enterprise Endpoint Security

October 10, 2017

Via: Security Intelligence

While we sometimes hear the term endpoint security used to describe the needs of both enterprises and individual consumers, the two differ greatly. Consumer endpoint security often refers to standard retail internet security packages consisting of antimalware, antispam and a […]


Vulnerabilities

IoT Device Hit by Credential Attack Every Two Minutes: Experiment

August 30, 2017

Via: Security Week

Internet of Things (IoT) botnets such as Mirai might not be in the headlines as often as they were several months ago, but the threat posed by insecure IoT devices is as high as before, a recent experiment has revealed. […]


Network security

How Police Trace Cellphones in IEDs Like the Ones in NYC

September 20, 2016

Via: Wired Threat Level

Less than 48 hours after a bomb exploded in a dumpster on a streetcorner in the Chelsea neighborhood of New York—and another device a few blocks away failed to explode—police have tracked the attack to New Jersey resident Ahmad Khan […]


Hacker

A USB device is all it takes to steal credentials from locked PCs

September 12, 2016

Via: InfoWorld

Most users lock their computer screens when they temporarily step away from them. While this seems like a good security measure, it isn’t good enough, a researcher demonstrated this week. Rob Fuller, principal security engineer at R5 Industries, found out […]


Hacker

This tiny device can infect point-of-sale systems and unlock hotel rooms

August 3, 2016

Via: CSO Online

Millions of point-of-sale systems and hotel room locks can be hacked by temporarily placing a small, inexpensive device several inches away from their card readers. The device, due to be presented Sunday at the DEF CON conference in Las Vegas, […]


Vulnerabilities

Amazon Kindle Browser Exposed Searches to MitM Attacks

July 27, 2016

Via: Security Week

Researchers discovered that an SSL flaw in Amazon’s Silk web browser could have been exploited by hackers to monitor users’ search engine traffic. Amazon Silk is a Chromium-based cloud-accelerated web browser developed for the company’s Kindle Fire tablets and Fire […]


Data loss

Data storage stolen at Lloyds, customer account data lost

September 15, 2015

Via: data-loss

A #lloyds #bank #data storage #device stolen from an RSA data center two months ago contains customer names, addresses, sort codes and account numbers for Lloyds’ Premier Account customers who had #royal sun alliance emergency home cover attached to their […]


Network security

New Facebook security tool released to help users protect accounts

August 3, 2015

Via: network-security

Facebook launched a new security tool this past week, “Security Checkup,” to acquaint users with the social media site’s optional security controls. Users will receive a reminder at the top of their News Feed about the tool, a Facebook staffer […]