You Are Here: Home » Industry News

Companies fear zero day and denial of service attacks most

Zero-day attacks are the most serious type of incidents and compromises for companies, according to 71 percent of respondents in a recent survey. DDoS was second, mentioned by 68 percent of respondents. Most respondents also say the consequences of an exploit of an existing software vulnerability greater than 3 months old (53 percent) and ransomware (51 percent) can be severe. Companies still struggle to ha...

IoT security spending to reach $348 million this year

The IoT security budget will rise 23.7 percent to $348 million in 2016 and reach $547 million by 2018, according to a new Gartner report. As more people become interested in connected cars, as well as spending on industry-grade equipment that requires proper security, the IoT security market will grow exponentially. "The market for IoT security products is currently small but it is growing as both consumers...

7 million Minecraft Pocket Edition players put at risk after Lifeboat hack

Over seven million members of the independent Minecraft "Lifeboat" community have had their security and privacy put at risk after hackers breached servers and stole usernames, email addresses and MD5-hashed passwords.7 million Minecraft Pocket Edition players put at risk after Lifeboat hack Over seven million members of the independent Minecraft "Lifeboat" community have had their security and privacy put...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sites, so you could book a flight or order a smart TV on her behalf? Ionut Cernica did exactly that. He helped Facebook patch a serious login vulnerability that allowed rogue users to access online accounts via Facebook’s social logi...

Careless employees remain the biggest security threat in 2016, study shows

Negligent or careless employees who don’t follow security policies are the biggest threat to endpoint security in organizations, according to a recent survey. Eighty-one percent of respondents say the biggest challenge is minimizing the threat of negligent or careless employees, from 78 percent in 2015. Since 2013, the percentage of respondents who say threats caused by malware infections that are stealthie...

Details on 87 Million Mexican Voters Available Online

The addresses of 87 million Mexican voters were recently accessible online to anyone with an internet connection -- all without authentication or protection by security mechanisms. Texan whistleblower Chris Vickery informed Mexican authorities of his findings, stating that the information could be used by criminals. While the information was available via AWS (Amazon Web Services), the company’s website doe...

Stolen usernames and passwords still cause almost a quarter of all data breaches

Companies and consumers alike love "the cloud". But the same security mistakes appear to be helping hackers steal data from cloud-based systems time and time again. And it's against that gloomy backdrop that a new report by the Cloud Security Alliance, "Identity Solutions: Security Beyond the Perimeter", makes a worthwhile read. According to surveys detailed in the Centrify-sponsored report, 22% of responde...

FBI paid over $1.3 million to hack into San Bernadino iPhone that contained ‘nothing of real significance’

Speaking at the Aspen Security Forum in London, FBI Director James Comey has suggested that the agency paid over $1.3 million in order to unlock the iPhone 5C used by Syed Farook Rizwan, one of the terrorists behind last December's attack in San Bernardino, California. Comey didn't come out in plain sight and state the cost of purchasing the exploit from gray-hat hackers, but an answer he gave to a journali...

Security is key concern for IoT developers, survey shows

Security is the main concern for almost half of the developers of IoT solutions, with interoperability and connectivity coming second and third, a recent survey shows. Image source: Eclipse IoT Working Group Some 48.3% of the developers working in organizations that have deployed IoT solutions identified security as their top concern, while 47.4% of all respondents fear security flaws in IoT products. “It s...

Any phone can get hacked via a global cellular network vulnerability

A vulnerability in the Signaling System Seven (SS7) has been recently exploited to track location, snoop on messages and phone calls on any type of smartphone, researchers found. Karsten Nohl, a German hacker, demonstrated how, by leveraging the flaw, he was able to track all this personal information from an iPhone owned by US Congressman Ted Lieu. First, it's really creepy, and second, it makes me angry,"...

© 2012 Powered By Bitdefender

Scroll to top