0 Comments
Security researchers disclosed two vulnerabilities in Bluetooth chips that put wireless access points, medical devices and more at risk of attack. Researchers at Armis, an enterprise IoT security company based in Palo Alto, Calif., discovered two vulnerabilities in Bluetooth Low Energy (BLE) chips manufactured by Texas Instruments and have branded the flaws as Bleedingbit. Armis
0 Comments
Iran’s critical infrastructure and strategic networks were attacked with what is reportedly a more sophisticated variant of the decade-old Stuxnet attack, according to Reuters. Iran’s head of civil defense agency, Gholamreza Jalali, told reporters that the newly discovered next-generation of Stuxnet that was trying to enter the systems consisted of several parts. At a live
0 Comments
Celebrated annually on November 3, Antimalware Day is an opportunity to recognize the work of cybersecurity professionals Since 2017, November 3 has been celebrated as Antimalware Day. Established by ESET, Antimalware Day aims to honor the work done by researchers in the field of information security and in the technology industry as a whole. As
0 Comments
Emails continue to be cyber-criminals’ vector of choice for distributing malware and phishing, according to a report released today by Proofpoint. The Quarterly Threat Report Q3 2018 found that the frequency of email fraud attacks and the number of individuals targeted per organization are continuing to rise. Credential-stealing banking Trojans comprised 94% of malicious payloads, and
0 Comments
Security researchers have unveiled details of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips embedded in millions of access points and networking devices used by enterprises around the world. Dubbed BleedingBit, the set of two vulnerabilities could allow remote attackers to execute arbitrary code and take full control of vulnerable devices without authentication, including
0 Comments
China’s search engine giant Baidu is continuing its partnership spree for Apollo, its open development platform for autonomous driving, after it inked a deal with Swedish automaker Volvo to develop level four self-driving passenger cars. “Autonomous driving has been our dream, but it’s coming true,” said Li Zhenyu, vice president and general manager of Baidu’s
0 Comments
On Tuesday, Oct. 16, the National Institute of Standards and Technology (NIST) held its “Kicking off the NIST Privacy Framework: Workshop #1” in Austin, Texas. I was honored to be asked to participate. This was the first in a series of public workshops focusing on the development of a useful and voluntary Privacy Framework, like
0 Comments
In his keynote speech at the Securing the Enterprise 2018 conference in Cambridge, MA, BT Security president Mark Hughes said that when it comes to the threats enterprises and government are facing, the global network is telling us that old strategies don’t work. In the face of ongoing cyber-attacks, mounting privacy concerns and daily data
0 Comments
Apple introduces a new privacy feature for all new MacBooks that “at some extent” will prevent hackers and malicious applications from eavesdropping on your conversations. Apple’s custom T2 security chip in the latest MacBooks includes a new hardware feature that physically disconnects the MacBook’s built-in microphone whenever the user closes the lid, the company revealed
0 Comments
Apple’s ideal display size is everywhere and everything Lucas Matney 7 hours Everything is already big. The iPhone SE died. The iPad Mini was last upgraded in 2015. The 11-inch MacBook Air died years ago. The smaller Series 4 Apple Watch has a bigger display than the larger Series 3 Apple Watch. Apple’s smallest devices
0 Comments
Many people think of two-factor authentication as a panacea for protecting users. While 2FA does drastically improve user protections, there are still risks. Attackers recognize that every security control implemented in an enterprise comes with its own risks that need to be managed. Therefore, they have learned to attack security controls in order to compromise
0 Comments
A new technique to escape malware detection has been used in a malicious campaign targeting smartphones, according to The Media Trust. In today’s blog post, Michael Bittner, digital security and operations manager at The Media Trust, revealed that the campaign involved third-party code that enabled smart malware delivery. The malware, dubbed JuiceChecker-3PC by The Media
0 Comments
iHeartMedia announced today that its streaming radio app iHeartRadio is coming to Mexico. In fact, a beta version of the app is already live, with plans for an official launch on November 3. As part of this launch, the company is partnering with Mexican broadcaster Grupo ACIR, which owns the Amor, Mix and La Comadre
0 Comments
Introduction Windows 10 is the most used OS for desktops in the world, so it’s a big target for hackers. IT professionals should get to know all the Windows 10 security tools they have at their disposal so they can protect users’ desktops. Options include native Windows 10 security tools and utilities such as Microsoft
0 Comments
In what it is calling the “most significant tech acquisition of 2018,” IBM announced today that it will acquire Red Hat, a global provider of open source cloud software. The two companies have finalized an agreement subject to Red Hat shareholder and regulatory approvals, which is expected to close in late 2019. According to IBM,