If the US President Can’t Secure His IoT Devices, Can You?

If the US President Can’t Secure His IoT Devices, Can You?

by Silviu Stahie, from Business Insights , on 22.01.2021

People’s homes are full of cameras and microphones, which in theory allow attackers to do more than just hijack your IoT devices for a DDoS attack. The extent of IoT security problems should worry everyone, especially since many homes lack essential protection. And few service providers can offer this kind of protection. read more

Belgian Hospital Reroutes Critical Patients after Cyberattack

Belgian Hospital Reroutes Critical Patients after Cyberattack

by Alina Bizga, from HotForSecurity , on 22.01.2021

On Sunday evening, the CHwapi hospital in Belgium suffered a cyberattack that prompted the facility to redirect emergency patients to other hospitals and delay surgical procedures. As reported by local media group L’Avenir, 80 of the hospital center’s 300 servers were affected by the attack, forcing staff and nurses to abandon digital entries and turn [and#8230;] read more

Texas Security Technician Who Hacked Security Cams to Watch Couples Having Sex Faces 5 Years Behind Bars

Texas Security Technician Who Hacked Security Cams to Watch Couples Having Sex Faces 5 Years Behind Bars

by Filip TRUTA, from HotForSecurity , on 22.01.2021

A former ADT employee entrusted with maintaining home security cameras has pleaded guilty to hacking into video feeds to watch couples having sex. ADT Inc provides residential, small and large business electronic security, fire protection, and other related alarm-monitoring services throughout the United States. The company’s motto, “Protection you can trust from the leader in [and#8230;] read more

Hackers release over 4,000 files stolen from Scottish environment agency in ransomware attack

Hackers release over 4,000 files stolen from Scottish environment agency in ransomware attack

by Graham CLULEY, from HotForSecurity , on 22.01.2021

SEPA was hit by ransomware attack on Christmas Eve Corporate plans and contracts published after organisation refused to give in to ransom demand Thereand#8217;s more bad news for the Scottish Environment Protection Agency (SEPA) which was hit by a ransomware attack on Christmas Eve and#8211; a serious security breach that has continued to impact its [and#8230;] read more

President Joe Biden Likely Won’t Be Able to Bring His Peloton Bike Due to Security Concerns

President Joe Biden Likely Won’t Be Able to Bring His Peloton Bike Due to Security Concerns

by Silviu STAHIE, from IoT Security Insights , on 21.01.2021

Joe Biden, the new US president, will have to renounce his Peloton smart bike because it presents significant security concerns, showing that IoT security problems are not limited to regular users. Peloton bikes are, in fact, smart IoT devices that feature online connectivity, cameras and microphones. Imagine the risk of placing this type of device, ... The post President Joe Biden Likely Won't Be Able to Bring His Peloton Bike Due to Security Concerns appeared first on Bitdefender. read more

New Phishing Attack Impersonates PayPal with Threats of ’Flagged‘ Profiles

New Phishing Attack Impersonates PayPal with Threats of ’Flagged‘ Profiles

by Silviu STAHIE, from HotForSecurity , on 21.01.2021

Security researchers identified a phishing attack impersonating PayPal that allowed criminals to access people’s credentials, their PayPal account, and then their finances. Credentials for access to financial resources will always be a target for criminals, and since PayPal is one of the largest companies of its kind, it has a bullseye painted on it. Squashing [and#8230;] read more

NSA Offers Sysadmins Guidance on Eliminating Obsolete TLS Configurations

NSA Offers Sysadmins Guidance on Eliminating Obsolete TLS Configurations

by Filip TRUTA, from HotForSecurity , on 21.01.2021

The US National Security Agency (NSA) has released a security advisory warning network administrators and security analysts that “new attacks against Transport Layer Security (TLS) and the algorithms it uses have been discovered.” Primarily aimed at government entities, the notice instructs IT admins to “make a plan on how to weed out obsolete TLS configurations [and#8230;] read more

Obsolete Adult Social Media App Exposes Lewd Photos of Users

Obsolete Adult Social Media App Exposes Lewd Photos of Users

by Alina Bizga, from HotForSecurity , on 21.01.2021

Researchers have recently stumbled upon an unsecure database belonging to Fleek, an X-rated social media app Fleek that ceased operations in 2019. The app was apparently popular on college campuses, offering an unfiltered alternative to all-too-familiar Snapchat. Users could upload unfiltered and unmoderated content including nudity, drugs and alcohol use, among others. According to vpnMentor [and#8230;] read more

Some FiberHome GPON FTTH Devices Are Full of Backdoors and Vulnerabilities, Research Reveals

Some FiberHome GPON FTTH Devices Are Full of Backdoors and Vulnerabilities, Research Reveals

by Silviu STAHIE, from IoT Security Insights , on 20.01.2021

A security researcher discovered a host of vulnerabilities and various backdoors in FiberHome HG6245D devices, amountintg to a severe security problem in countries where ISPs deploy this hardware. The FiberHome device is a GPON (Gigabit Passive Optical Networks) FTTH (fiber-to-the-home). It’s a device that transforms the optical network into Ethernet, allowing for deployment in large ... The post Some FiberHome GPON FTTH Devices Are Full of Backdoors and Vulnerabilities, Research Reveals appeared first on Bitdefender. read more

OpenWRT Reveals Forum Data Breach; Users Advised to Reset Passwords

OpenWRT Reveals Forum Data Breach; Users Advised to Reset Passwords

by Silviu STAHIE, from HotForSecurity , on 20.01.2021

OpenWRT open-source project says someone used an administrator’s credentials to breach their forum and stole a list of list user names, email addresses, and various other statistical data. Forum data breaches are not uncommon, as threat actors take advantage of vulnerabilities or employ other methods to gain access. Unfortunately, one of those methods is to [and#8230;] read more

Next >>