TechDay US - America's technology news network

Security vulnerabilities stories - Page 23

Vulnerability
Sonatype and HackerOne partner on open source vulnerability reporting
Mon, 25th Mar 2019
#
partner programmes
#
supply chain
#
open source
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process.
Malware6
Check Point names February’s most disruptive malware
Tue, 12th Mar 2019
#
security vulnerabilities
#
coinhive
#
cryptomining
Coinhive tops Check Point’s Global Threat Index for February 2019, marking its 15th month as the most disruptive malware despite its impending shutdown.
Thinkstockphotos 508373762
Logitech Harmony Hub vulnerabilities leave devs fuming
Tue, 5th Mar 2019
#
iot
#
logitech
#
security vulnerabilities
Logitech backtracks on decision to remove firmware version of Harmony Hub, after critical security flaws were revealed. Millions of users affected.
Github octocat detective
GitHub's Bug Bounty program gets bigger
Mon, 4th Mar 2019
#
martech
#
apm
#
software development
GitHub’s Bug Bounty program is now five years old and to mark the occasion it has revamped the program’s scope, rewards, and new legal rules.
Gettyimages 891422960
IBM X-Force Red & Qualys introduce automated patching
Tue, 19th Feb 2019
#
ibm
#
security vulnerabilities
#
patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Gettyimages 1127122070
Swiss Post asks public to hack its e-voting system
Mon, 18th Feb 2019
#
online voting
#
security vulnerabilities
#
bug bounty
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Mi electric scooter 03
Security flaw in Xiaomi electric scooters could have deadly consequences
Wed, 13th Feb 2019
#
xiaomi
#
security vulnerabilities
#
electric scooter
Xiaomi's M365 electric scooters pose severe risks due to Bluetooth security flaws, potentially allowing attackers to control and endanger riders.
Malware5
Bug makes Android phones hackable via PNG image files
Fri, 8th Feb 2019
#
smartphones
#
google
#
security vulnerabilities
This means any application handling PNG files that have been carefully crafted by an attacker can end up running the attacker’s code.
Thinkstockphotos 157001373
APRA Prudential Standard CPS 234: How to communicate with the board
Wed, 5th Dec 2018
#
fintech
#
security vulnerabilities
#
tenable network security
The Australian Prudential Regulation Authority’s standard, CPS 234, is aimed at minimising the threat of cyber attacks for APRA-regulated entities.
Thinkstockphotos 691333526
Cyber threat spotlight: Kiwis report more, lose less in Q2
Wed, 19th Sep 2018
#
firewalls
#
network infrastructure
#
network security
CERT NZ's latest report shows cyber threats and incident reports increased in Q2, yet monetary losses dropped by 24%, with most under NZD $500.
Thinkstockphotos 976370294
2018 proves to be a mixed bag of severe cyber threats, report finds
Mon, 17th Sep 2018
#
malware
#
firewalls
#
network infrastructure
2018 saw a surge in cyber threats with over 30 zero-day vulnerabilities and nearly 24,000 unique malware variants, Fortinet's report reveals.
Img hog1vzd5owi3vpiehyp7urqi
Quick thinking remedies vulnerability in Schneider Electric ICS controller
Fri, 7th Sep 2018
#
datacentre infrastructure
#
power / energy
#
schneider electric
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
Router hack
MikroTik routers in NZ may be at risk of cryptomining - Symantec
Mon, 20th Aug 2018
#
symantec
#
router
#
security vulnerabilities
New Zealand's MikroTik routers may be at risk of cryptomining attacks due to a global campaign targeting 157,000 devices, warns Symantec. Install patches.
Intel core s series chip
Flaw discovered in Intel chips, allows attackers to steal cloud data
Thu, 16th Aug 2018
#
intel
#
cpu
#
spectre
A newly discovered flaw in Intel chips, dubbed Foreshadow, can lead attackers to access sensitive data from personal computers and cloud services.
Screen shot 2018 08 15 at 11
Exclusive interview: Major MFA vulnerability discovered in Microsoft’s ADFS
Wed, 15th Aug 2018
#
mfa
#
iam
#
microsoft
A critical flaw in Microsoft's ADFS allows bypassing MFA, posing a severe risk, warns Okta’s REX team. Urgent patching is recommended for users.
Thinkstockphotos 856672504 8rwqcmm
At-work collaboration apps most vulnerable to cyber attacks
Fri, 27th Jul 2018
#
cloud services
#
security vulnerabilities
#
cloud communications
According to a survey of 500 decision makers across several industries, 80% believe that cloud collaboration tools are vulnerable to cyber attacks.
Thinkstockphotos 826175066
Google Chrome launches new feature to block Spectre attacks
Tue, 17th Jul 2018
#
google
#
chrome
#
spectre
Google Chrome's latest update brings 'site isolation' to prevent Spectre attacks, offering advanced protection by isolating each tab's process.
Thinkstockphotos 547244256
GitHub rolls out security alerts feature for Python
Mon, 16th Jul 2018
#
martech
#
apm
#
software development
GitHub adds security alerts for Python, allowing users to be notified when their code depends on packages with known vulnerabilities.
Secure banking
Use of banking trojans up 50%, cryptomining still dominant malware – report
Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
P90305602 highres
BMW awards Chinese security team's work in exposing connected vehicle vulnerabilities
Thu, 24th May 2018
#
cartech
#
bmw
#
tencent
When Chinese security researchers found vulnerabilities in BMW’s connected vehicles, BMW didn’t just fix the vulnerabilities, it awarded the team.