Fighting sophisticated phishing threats during the digital revolution

Today attacks come across multiple channels such as mobile, web, social network, and email as well. And those cybercriminals are using a combination of social engineering techniques such as email spoofing, phishing, malware, attachment, URLs, and all the tricks to have the end user employees giving out personal or sensitive information. Once a cybercriminal gets…

Multiple security flaws found in mainstream robotic technologies

IOActive exposed numerous vulnerabilities found in multiple home, business, and industrial robots available on the market today. The array of vulnerabilities identified in the systems evaluated included many graded as high or critical risk, leaving the robots highly susceptible to attack. Attackers could employ the issues found to maliciously spy via the robot’s microphone and…

Attackers thrive in a fluid market, while bureaucracy constrains defenders

A new global report from Intel Security and the Center for Strategic and International Studies (CSIS) reveals three categories of misaligned incentives: corporate structures versus the free flow of criminal enterprises; strategy versus implementation; and senior executives versus those in implementation roles. Based on interviews and a global survey of 800 cybersecurity professionals from five…

500,000+ devices have dangerous apps installed

At Mobile World Congress (MWC) 2017, connected cars, the future of smart homes and, of course, the newest handsets are top of the agenda. Intel Security’s latest findings show consumers are being tempted by the efficiency and entertainment of such connected devices, revealing the average British person now spends 35% of their time at home…

Not all threat intelligence is created equal

Threat intelligence provides you a lot of information and intelligence about what the threats are to your network, and what you need to focus in on from a security perspective. But threat intelligence platforms are, really, that next step in the operational chain. It’s how you actually use, consume and utilize the threat intelligence that’s…

Android for cars: Secure connection?

Fast-forward 17 years and there are apps for everything — even your car. Chances are, if an app might make part of your life easier, someone will develop it and plenty of people will use it. Over the past few years, the concept of the connected car has continued to evolve — and become reality….

Wi-Fi risks: Delivering a secure hotspot

The fact that Wi-Fi stands for Wireless Fidelity hints at how long Wi-Fi has been around, but it was only in 1999 that the Wi-Fi Alliance formed as a trade association to hold the Wi-Fi trademark, under which most products are sold. Today, Wi-Fi is on the top of the list of must-haves for businesses…

54% of organizations have not advanced their GDPR compliance readiness

More than half of organizations have failed to begin any work on meeting minimum General Data Protection Regulation (GDPR) compliance, according to a study conducted by Vanson Bourne. Intended to harmonize data security, retention and governance legislation across European Union (EU) member states, GDPR requires greater oversight of where and how sensitive data—including personal, credit…

Nagios 4.2.4 closes serious root privilege escalation bug

If you’re using Nagios to monitor your systems, networks and infrastructure, and you have not updated to version 4.2.4, you better hop to it. This latest release fixes a high severity root privilege escalation vulnerability (CVE-2016-9566) discovered by researcher Dawid Golunski, who published a proof-of-concept exploit for it on Thursday.