The NUUO Peekaboo vulnerability gives hackers your camera feed | Avast

| | cybercrime, Privacy, Security News
New vulnerabilities found in NUUO surveillance software can put cybercriminals in the director’s chair. When exploited through a stack buffer overflow, the Peekaboo vulnerability grants hackers full control over the surveillance video ...
The need to protect 'unstructured data' by Byron Acohido

MY TAKE: The no. 1 reason ransomware attacks persist: companies overlook ‘unstructured data’

All too many companies lack a full appreciation of how vital it has become to proactively manage and keep secure “unstructured data.” One reason for the enduring waves of ransomware is that ...

Flushing the Mac App store

Two instances of app removal from the Mac App Store ...
Apple Addresses Security Problems in iOS 12, Safari 12

Apple Addresses Security Problems in iOS 12, Safari 12

Apple has released a new set of security fixes that address vulnerabilities in Safari, iOS, watchOS, and tvOS. It should be noted that some of the vulnerabilities were disclosed before the security ...

Apple to make life easier for law enforcement

| | Apple, law enforcement, passwords, pins
Apple has experienced much friction with law-enforcement regarding information sharing and access to suspects' devices. Will provision of a formal procedure reduce that friction? ...
A Quarter of Civilian Federal Agencies Have Adopted DMARC and SPF for All Domains

A Quarter of Civilian Federal Agencies Have Adopted DMARC and SPF for All Domains

A quarter of civilian federal agencies have adopted DMARC and SPF email authentication protocols for all their domains in compliance with a mandate. Thirty-four percent of 133 agencies are now fully compliant ...

Could smart speakers undo your smart home? | Avast

Juniper Research predicts that by 2022 more than half the homes in the U.S. will contain smart speakers like today’s popular Amazon Alexa and Google Home, and it’s easy to see why ...

Dangers on Safari

| | Apple, css, ios, iPhones, macos, Phishing, spoofing
The Safari Reaper attack, and URL spoofing ...
The downside of 'encryption key escrow' by Byron Acohido

Q&A: The troubling implications of normalizing encryption backdoors — for government use

Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today? We know how Vladmir Putin, Xi Jinping ...
Privilege Escalation Vulnerability Found in Honeywell Android Computers

Privilege Escalation Vulnerability Found in Honeywell Android Computers

A total of 17 Honeywell handheld computers were recently found vulnerable to a privilege escalation bug that could enable attackers to fully compromise the device and its stored data. The remotely exploitable ...
Loading...