/ Security News /

Researchers were able to change the blink rate on a hard drive LED to turn it into a data stream, which they were then able to capture from outside the building. Source link Related posts: Researchers use hacked hard drive LED to steal data from air-gapped computer In 2016, Pence used hacked personal email account …

/ Security News /

Image: iStockphoto/Ali Kerem Yücel In 2016, the number of malicious installation packages hit more than 8.5 million—three times more than the year before, according to a report on mobile malware evolution from Kaspersky Lab, released on Tuesday. The firm registered nearly 40 million attacks by malicious mobile software over the course of the year as …

/ Security News /

Security breaches are a major concern for those adopting IoT. Image: Aruba Aruba released a global IoT study on Tuesday that revealed that just over half of respondents have implemented IoT, but 84% have already experienced a security breach as a result. The study, with 3,100 respondents from key industry sectors and IT surveyed in …

/ Security News /

Image: CloudPets A recent data breach of CloudPets, makers of connected teddy bears, left more than 2 million voice recordings of children and their parents exposed online. The culprit? A poorly-secured MongoDB database. The breach was first reported in a blog post from Troy Hunt, a Microsoft MVP who specializes in online security and cloud, …

/ Security News /

Image: AleksOrel/iStockphoto The ability to thoroughly anonymize data has been suspect for years. In 2008, Arvind Narayanan and colleague Vitaly Shmatikov from the University of Texas at Austin discovered how easy it was to unmask customer data from supposedly anonymized Netflix databases (PDF). Since 2006, other forms of data anonymization—or removing Personally-Identifiable Information (PII) from …

/ Security News /

Image: iStock / ipopba Are you ready for terabit-size cyber attacks? Professional services firm Deloitte recently released its annual technology, media, and telecommunications (TMT) report. The research predicts that the rise of the cloud, powerful mobile devices, and the Internet of Things is intrinsically coupled with large-scale hacks. Innovation, the report confirmed, has helped companies …

/ Security News /

This month has yet been kind of interesting for cyber security researchers, with Google successfully cracked SHA1 and the discovery of Cloudbleed bug in Cloudflare that caused the leakage of sensitive information across sites hosted behind Cloudflare. Besides this, Google last week disclosed an unpatched vulnerability in Windows Graphics Device Interface (GDI) library, which affects …

/ Security News /

A severe security vulnerability has been discovered in the CloudFlare content delivery network that has caused big-name websites to expose private session keys and other sensitive data. CloudFlare, a content delivery network (CDN) and web security provider that helps optimize safety and performance of over 5.5 Million websites on the Internet, is warning its customers …

/ Security News /

Cybersecurity challenges can be overwhelming. Cisco’s Trust Strategy Officer Anthony Grieco identifies four essential steps to prevent hacking, respond to threats, and build a holistic cybersecurity culture. Source link Related posts: Video interview: Why your company should invest in cybersecurity infrastructure Video interview: The biggest enterprise cybersecurity red flags Video: How to protect your company …