September 19, 2022
Via: Help Net SecurityApple has always touted the security and privacy capabilities of their devices. Being responsible for both the hardware and the associated OS has allowed Apple to create a closed-end approach to shield users against some common attacks. But it’s possible […]
Threats & Malware, Virus & Malware
July 8, 2022
Via: Help Net SecurityQNAP Systems is warning about Checkmate, a new piece of ransomware targeting users of its network-attached storage (NAS) appliances. “Preliminary investigation indicates that Checkmate attacks via SMB services exposed to the internet, and employs a dictionary attack to break accounts […]
Security, Threats & Malware, Vulnerabilities
August 7, 2020
Via: TrendMicro BlogWelcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Based on research that Trend Micro released during Black Hat USA this past week, […]
Threats & Malware, Virus & Malware
August 6, 2020
Via: Help Net SecurityCommodity malware campaigns utilizing machine identities are increasing rapidly, according to threat analysis from Venafi. For example, malware attacks using machine identities doubled from 2018 to 2019, including high-profile campaigns such as: TrickBot, Skidmap, Kerberods and CryptoSink. Researchers gathered data […]
January 7, 2020
Via: Help Net SecurityA new report from Juniper Research found that facial recognition hardware, such as Face ID on recent iPhones, will be the fastest growing form of smartphone biometric hardware. This means it will reach over 800 million in 2024, compared to […]
November 27, 2019
Via: Threat PostMicrosoft is warning of malware, Dexphot, that has infected more than 80,000 machines, sucking up their CPU power in order to mine cryptocurrency. Researchers first discovered Dexphot in October 2018 and saw its activity peak during July. They said that […]
Mobile, Network security, Security, Wireless security
September 11, 2019
Via: TechRadarA security researcher from Trustwave has discovered vulnerabilities in several D-Link and Comba routers which could make it easy for cybercriminals to see usernames and passwords stored on the devices. Trustwave SpiderLabs’ Simon Kenin found a total of five security […]
August 2, 2019
Via: Help Net SecurityAs the August 13 deadline looms for the US ban on Chinese surveillance cameras, the news cycle is re-engaged with the issue. The panic about banned cameras still being in operation shines a spotlight on both the severity of the […]
Mobile security, Network security
March 2, 2017
Via: Naked SecurityIt’s noticeable how many vendors are pushing the IoT security message, including names such as F5 Networks, which many would not immediately associate with this competence. In the wake of high-profile recent attacks, vendors such are clearly pushing the vulnerability […]
February 13, 2017
Via: WiredAmerican citizens can’t be deported for refusing to give up an encryption or social media password, says the ACLU’s Wessler. That means if you stand your ground and don’t reveal passwords or PINs, you may be detained and your devices […]
December 8, 2016
Via: Help Net Security80 different models of Sony IPELA Engine IP Cameras have multiple backdoors that can be misused by attackers to take control of the device, disrupt its functionality, add it to a botnet, and more. Researchers from SEC Consult discovered two […]
December 6, 2016
Via: Dark ReadingThe Department of Homeland Security is fully justified in urging security standards for the Internet of Things. In an effort to curtail a new and disturbing cyber-attack trend, the Department of Homeland Security has placed Internet of Things (IoT) device […]
November 15, 2016
Via: Help Net SecurityThe Internet of Things (IoT) is now a major force in the weaponization of DDoS. In 2016, IoT botnets have fueled a number of attacks, including the largest-ever DDoS attack, and that role will only grow in the coming years. […]
November 1, 2016
Via: Help Net SecurityIf you were online on Friday October 21st, you were probably affected by the DDoS attack against managed DNS provider Dyn. Dyn observed that tens of millions of IP addresses participating in the attack were from IoT devices infected by […]
October 13, 2016
Via: InfoWorldMillions of IoT devices are misconfigured so that they can forward messages — which, combined with default admin settings, allows them to be used to attack e-commerce and other websites, a new report says. The problem is well known and […]
October 11, 2016
Via: Security WeekNon-profit research and development organization MITRE has challenged experts to come up with novel ideas for detecting rogue Internet of Things (IoT) devices on a network. MITRE’s goal is to find a solution that can help network administrators monitor IoT […]
October 10, 2016
Via: Panda SecurityThe tablets or smartphones at your office connect to either 3G or 4G (which is better than WiFi). When tablets and other connected devices (like smartphones or smartwatches) become essential to an employee’s work, then it is imperative that these […]
September 27, 2016
Via: InfoWorldSecurity researchers have been warning for years that poor security for internet of things devices could have serious consequences. We’re now seeing those warnings come true, with botnets made up of compromised IoT devices capable of launching distributed denial-of-service attacks […]
Application security, Mobile security
September 23, 2016
Via: CSO OnlineU.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to “accelerate […]
September 13, 2016
Via: Help Net SecurityThe PCI Council has updated its payment device standard to enable stronger protections for cardholder data, which includes the PIN and the cardholder data (on magnetic stripe or the chip of an EMV card) stored on the card or on […]