admin

0 Comments
Fitbit data may have helped catch one of its customer’s killers, and not for the first time. According to numerous media reports, a 90-year-old visited his stepdaughter at her home in San Jose, Ca. earlier this month, where he says he brought her pizza and visited briefly. But according to data provided to authorities by
0 Comments
DigiCert Inc., Gemalto and ISARA Corp. have teamed up develop quantum-proof digital certificates and secure key management for IoT devices. The partnership will combine ISARA’s quantum-proof algorithms with Gemalto’s SafeNet hardware security modules and DigiCert’s public key infrastructure (PKI) to offer certificates that are resistant to quantum computing threats. Scott Totzke, CEO at ISARA, based
0 Comments
A federal judge denied Tesla’s motion to dismiss charges in a lawsuit claiming that it mistreated foreign workers. This means the automaker will have to defend itself at trial against allegations that foreign workers at its Fremont factory worked shifts that violated forced labor laws and were threatened with deportation if they reported injuries. The
0 Comments
US financial services firms suffered three-times more data breaches in the first six months of 2018 than during the same period in 2016, according to new data from Bitglass. The security vendor aggregated data from the Identity Theft Resource Center (ITRC) and the Privacy Rights Clearinghouse (PRC) to gain insight for its Financial Breach Report
0 Comments
by Danny Bradbury Hackers are taking over high-profile Instagram users’ accounts and holding them to ransom, it was revealed this week. At least four influencers have lost control of their accounts and received demands to send bitcoin for their return, but in some cases the attackers retained control or deleted the accounts. Motherboard reported that
0 Comments
WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign’s goals Information and communications technologies permeate our day-to-day lives and are vital for the daily operations of both enterprises and governments. This
0 Comments
Shares of Stitch Fix plunged more than 20 percent in after-hours trading on Monday following the release of a tepid fourth-quarter earnings report. The online retailer and personal styling service’s adjusted earnings exceeded analyst expectations, but its revenue and active users fell short of estimates. In the quarter ending July 28, Stitch Fix reported a net
0 Comments
The Information Commissioner’s Office (ICO) has fined Bupa Insurance Services Limited (Bupa) £175,000 for its failure to protect the personal information of its customers. Had the timing of the breach been different, Bupa would have faced fines under the General Data Protection Regulations (GDPR), but the security incident occurred prior to those regulations going into
0 Comments
Financial companies continue to innovate with their online products and services, bringing conveniences for customers, but challenges when it comes to security. This is because the current “fintech” (financial technology) landscape doesn’t just include traditional banks with online services. New players, like cryptocurrency sites, robo advisors and online loan providers have all joined the party.
0 Comments
It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps Facebook disclosed on Friday, September 28, that attackers had exploited a flaw in its code that allowed them “to steal Facebook access tokens which they
0 Comments
Chinese cybersecurity researchers have uncovered a widespread, ongoing malware campaign that has already hijacked over 100,000 home routers and modified their DNS settings to hack users with malicious web pages—especially if they visit banking sites—and steal their login credentials. Dubbed GhostDNS, the campaign has many similarities with the infamous DNSChanger malware that works by changing
0 Comments
Employee monitoring to protect against data loss and misuse is becoming mandatory in more industries, but insider security is harder than ever to enforce. As more regulations around data privacy and missteps at high-profile companies generate ongoing headlines, security teams attempt to monitor insider threats without stepping into the quagmire.  Teramind, a startup in Miami
0 Comments
A call for new cybersecurity leadership came from Massachusetts governor Charlie Baker at yesterday’s 2018 Massachusetts Cybersecurity Forum. Hosted by Gov. Baker, the forum brought together more than 200 of the state’s foremost practitioners from the public and private sectors. The forum included thought leaders from cybersecurity companies, universities and research and development centers to
0 Comments
by John E Dunn Researchers have discovered that several leading Android-based password managers can be fooled into entering login credentials into fake phishing apps. Password managers can be used to create, store, enter and autofill passwords into apps and websites. As well as allowing users to maintain scores of strong passwords, password managers can also