Millions of Connected Cameras Vulnerable to Hijacking

Millions of Connected Cameras Vulnerable to Hijacking

by Ionut ILASCU, from IoT Security Insights , on 25.05.2019

Two vulnerabilities discovered in communication technology in video monitoring equipment from hundreds of brands allow hackers to hijack security cameras, baby monitors and smart doorbells. Over 2 million vulnerable devices have been identified online, but the number may be higher. The number of affected devices comes from a common component, iLnkP2P, that facilitates the connection ... The post Millions of Connected Cameras Vulnerable to Hijacking appeared first on Bitdefender. read more

Cyber Attacks Remain a High Risk, and More Enterprises are Buying Insurance for Protection

Cyber Attacks Remain a High Risk, and More Enterprises are Buying Insurance for Protection

by Razvan Muresan, from Business Insights , on 24.05.2019

The Society of Actuaries (SOA), the world's largest actuarial professional organization, recently released its annual survey of emerging risks in conjunction with other partner organizations. The good news for security programs is that cyber risk for the first time in five years was not ranked at the top of the list. The bad news is that cyber security is still a formidable challenge for organizations. read more

Snapchat workers snooped on users with internal tool

Snapchat workers snooped on users with internal tool

by Graham CLULEY, from HotForSecurity , on 24.05.2019

Snapchatand#8217;s 186 million users may be in for a rude awakening today after revelation that multiple employees of the social media giant were able to abuse their power and snoop on members. As Motherboard journalist Joseph Cox describes, current and former employees of Snap have described how an internal tool and#8211; which was only supposed [and#8230;] read more

The Internet knows your every move – this is why you should care

The Internet knows your every move – this is why you should care

by Filip TRUTA, from HotForSecurity , on 24.05.2019

In today’s digital economy, every company wants your data – from things like your email address and credit card number, right down to your deepest desires. And you willingly hand over this data on the promise that your experience will be tailored to your liking, that the ads you’ll see will be the ones you [and#8230;] read more

Facebook Says 5% of Monthly Active Accounts Are Fake, Deletes 3B in 6 Months

Facebook Says 5% of Monthly Active Accounts Are Fake, Deletes 3B in 6 Months

by Luana PASCU, from HotForSecurity , on 24.05.2019

Facebook removed 2.2 billion fake accounts between January and March 2019, bringing the total of accounts disabled to more than 3 billion over a six-month period, which includes Q4 2018 data, according to the company’s Community Standards Enforcement report published Thursday. The social network says the number of removed accounts has doubled over the past six [and#8230;] read more

Customer Details from 2015 TalkTalk Breach Found on Google

Customer Details from 2015 TalkTalk Breach Found on Google

by Luana PASCU, from HotForSecurity , on 24.05.2019

After countless complaints from viewers about fraud, a BBC Watchdog Live investigation revealed that UK telecom TalkTalk didn’t notify 4,545 customers that their data had been compromised in the 2015 data breach, writes the publication. With a basic Google search, reporters found sensitive information, including names, addresses, email addresses, dates of birth, TalkTalk customer numbers, [and#8230;] read more

How can Bitdefender BOX protect busy modern moms and dads?

How can Bitdefender BOX protect busy modern moms and dads?

by Cristina POPOV, from IoT Security Insights , on 24.05.2019

An increasing number of inspiring, intelligent people are running their own tech businesses and changing the burgeoning ”Internet of Things” industry. But at the same time, many simply want to enjoy the convenience the IoT brings to their life. A smart thermostat, washing machine or vacuum cleaner (named robovac) connects to the internet and can ... The post How can Bitdefender BOX protect busy modern moms and dads? appeared first on Bitdefender. read more

Baltimore Struggles to Rebuild Systems after Refusing to Pay Bitcoin Ransom

Baltimore Struggles to Rebuild Systems after Refusing to Pay Bitcoin Ransom

by Luana PASCU, from HotForSecurity , on 23.05.2019

Baltimore is still recovering from the Robbinhood ransomware attack on the city on May 7 and crushed all administrative transactions, payments and communication. The same ransomware hit the City of Greenville in North Carolina last month. Baltimore city officials refused to pay ransom in bitcoin to decrypt computers and regain access to data. Local government [and#8230;] read more

Optus Network Outage Shuts Down Internet, IoT Devices for 24 Hours

Optus Network Outage Shuts Down Internet, IoT Devices for 24 Hours

by Luana PASCU, from IoT Security Insights , on 23.05.2019

There’s nothing like a phone-controlled air conditioning system during those hot Australian days, remotely programming your smart thermostat to cool your home to the perfect temperature for your return from work, or monitoring your home on your phone to check on your favorite pet while you’re on vacation. Unfortunately, not all Australians could enjoy their ... The post Optus Network Outage Shuts Down Internet, IoT Devices for 24 Hours appeared first on Bitdefender. read more

‘Your account has been locked’ – 7 telltale signs of a phishing scam

‘Your account has been locked’ – 7 telltale signs of a phishing scam

by Filip TRUTA, from HotForSecurity , on 23.05.2019

According to study after study, phishing remains the most efficient attack vector for bad actors to steal your data. Even though attackers have plenty of options, they prefer phishing because it does one thing better than any other method: it tricks victims into partaking in their own attack. Some of the most lucrative phishing emails [and#8230;] read more

Next >>