New EU Privacy Law May Weaken Security

Companies around the globe are scrambling to comply with new European privacy regulations that take effect a little more than three months from now. But many security experts are worried that the changes being ushered in by the rush to adhere to the law may make it more difficult to track down cybercriminals and less likely that organizations will be willing to share data about new online threats. On May 25, 2018, the General Data Protection Regulation (GDPR) takes effect. The law, enacted by the European Parliament, requires technology companies to get affirmative consent for any information they collect on people within the European Union. Organizations that violate the GDPR could face fines of up to four percent of global annual revenues.
Read more

DoubleDoor IoT Botnet Abuses Two Vulnerabilities to Circumvent Firewalls, Modems

The DoubleDoor Internet of Things (IoT) botnet circumvents firewall protection and other security measures by abusing two vulnerabilities. Detected by NewSky Security in its honeypot logs, DoubleDoor begins by deploying CVE-2015-7755. The vulnerability allows remote attackers to gain administrative access to ScreenOS, an operating system for Juniper Networks’ hardware firewall devices, by entering a hardcoded … Read More The post DoubleDoor IoT Botnet Abuses Two Vulnerabilities to Circumvent Firewalls, Modems appeared first on The State of Security.
Read more

Is My Smart Home Telling People What I Do Every Day?

2017 will forever be known as the year that the smart home started to take off.  Researchers estimate that Amazon has sold over 15 million Echo devices  to date. Plus, Google has sold another 5 million Google Homes.  The overall smart home market is expected to grow to over $50 billion by 2022.  Already 1 The post Is My Smart Home Telling People What I Do Every Day? appeared first on Radware Blog.
Read more

How to Prevent Attacks on These 7 Most Vulnerable Connected Toys

What’s the next toy you are going to give to your child? Maybe, you are thinking about a voice-activated plush bear that can speak some clever lines and “engage” your child? That is great, but make sure you carefully consider your choices first if you want to buy an internet-connected toy. These Internet-of-Things (IoT) toys The post How to Prevent Attacks on These 7 Most Vulnerable Connected Toys appeared first on TechSpective.
Read more

Water Utility Infected by Cryptocurrency Mining Software

A water utility in Europe has been infected by cryptocurrency mining software. This is a relatively new attack: hackers compromise computers and force them to mine cryptocurrency for them. This is the first time I've seen it infect SCADA systems, though. It seems that this mining software is benign, and doesn't affect the performance of the hacked computer. (A smart...
Read more

What Does a Windstorm in Wyoming Have to Do with Cyber Security?

Natural disasters serve as excellent examples of the unforeseen consequences that a cyber-attack against infrastructure will have. Take for example a strong windstorm in Wyoming in February 2017. The storm knocked down power lines, forcing water and sewage treatment plants to operate on backup generators, which weren’t available to some of the pumps that moved The post What Does a Windstorm in Wyoming Have to Do with Cyber Security? appeared first on Radware Blog.
Read more

Adobe Confirms Unpatched Flash Player Vulnerability Used in Attacks

Adobe Systems has confirmed that attackers are in possession of an exploit for a critical zero-day vulnerability in Flash Player that will be patched over the coming days. News of the flaw first came Jan. 31 in an alert from the South Korean Computer Emergency Response Team (KR-CERT), but researchers from security firm Hauri believe..
Read more

The Looming Enterprise IoT Security Threat

Distributed denial-of-service (DDoS) botnets are not the only threat organizations need to worry about when it comes to the internet of things (IoT). The Mirai attacks of 2016 engendered a pretty broad understanding of how botnets assembled from ordinary consumer IoT devices can be used to launch crippling DDoS attacks on enterprises. But organizations that..
Read more

Hardware Security Is Best for Securing Healthcare, Finance IoT

Over the past year, we’ve seen a wave of high-profile cyberattacks, and all companies should be concerned. These attacks haven’t been limited to any one industry, but range from credit scores (Equifax) to health care (WannaCry ransomware attack). WannaCry, in particular, points to a growing threat: cyberattacks on infrastructure. As CNN explained, “The ransomware, called..
Read more
Page 1 of 1712345...10...Last »