Researchers have conducted a review of the security holes that exist in popular smart-light brands.
Researchers at the University of Arizona are developing a fresh approach to cybersecurity modeled on the human central nervous system. The new method will aim to detect and neutralize cyber-threats in their earliest stages before they have a chance to do any serious damage. Inspiration for the project came from human biological responses; for example, how the body's immune system fights a virus and how a person will instinctively pull their fingers away from a burning hot surface before their brain has even received the message that the body is at risk of harm.
New research has found that only a quarter of Americans know that surfing the internet in private browsing mode only prevents other users of the same computer from seeing what you've been up to online.
As we find it harder to employ security staff, so it becomes practical to outsource cyber-security to those who have managed to snag themselves some experts.
Privacy laws, like any other infosecurity control, have exploitable vulnerabilities. For social engineering purposes, GDPR has a number of real benefits. Firstly, companies only have a month to reply to requests and face fines of up to 4 per cent of revenues if they don't comply, so fear of failure and time are strong motivating factors.
Concern grows that criminals could use false video and audio to target businesses.
An experienced accountant fell for a scammer mirroring Metro Bank’s security and customer service.
Spammers are increasingly turning to common file-sharing and object storage services such as Google Drive and Microsoft Azure, in an attempt to evade ever-better corporate filters.
Universities must do more to protect themselves, and the sensitive information they hold, against the ever-expanding range of increasingly sophisticated threats.
Card fraud is evolving, with amateur fraudsters able to “enrol” in online “classes” where they can learn how to use stolen card details to buy smaller-value items.
Survey results indicate that vendors need to be able to provide actionable intelligence out of the mass of data they collect and not just focus on indicators of compromise which would only address past problems.
You should keep your guard up when communicating with Internet people who you don’t know, even if their email address and website domain look legit and their DKIM signatures check out. Also, remember that it’s extremely easy to overlook a large number of inconsistencies and oddities if you believe someone’s underlying story, especially if this story makes you feel good.
The average FTSE 250 company exposes 35 different avenues of attack for would-be hackers, according to a report, despite the vast majority having “serious issues” with keeping business-critical systems up to date.
£1,000 would be enough to tempt 25% of employees to give away company information. Shockingly, 5% would give it away for free. The What Is the Price of Loyalty Report reveals how 10% of respondents would also sell intellectual property, such as product specifications, product code and patents, for £250 or less.
Baltimore this month joined Atlanta, San Diego and Newark in the list of US cities hit by ransomware attacks as the cyber intrusions are expected to continue. City agencies are especially ripe targets because they often maintain databases of vital and sensitive information while having constrained information security budgets and inadequate technological safeguards. Municipal governments and hospitals … just don’t have the top cybersecurity out there, and the criminals know this.
The maker of vehicle license plate readers used extensively by the US government and cities to identify and track citizens and immigrants has been hacked.
The vulnerability, designated CVE-2019-0708 and dubbed BlueKeep, can be exploited by miscreants to execute malicious code and install malware on vulnerable machines without the need for any user authentication: a hacker simply has to be able to reach the box across the internet or network in order to commandeer it.
Smart TVs and other internet-connected household devices will be made to carry labels setting out how secure they are, under proposals being put forward by the government. The problem is what happens to those who don’t follow the guidelines. Or, more importantly, who is going to check that a device does follow whatever the eventual guidelines are.
There is nothing to stop fraudsters changing the caller ID to mirror that of your bank.
Network intruders are staying longer and going after wider swathes of machines with their attacks. This additional attention being paid to making sure they're undetected is part of a larger strategy by attackers to stay in the networks they infiltrate for longer. With that extra time, the hackers are looking to get more out of the systems they compromise. Hackers will now not simply look to compromise a large business, but also to steal its identity to an extent.