Auto Added by WPeMatico

Tokyo Olympics Postponed, But 5G Security Lessons Shine

Threatpost Senior Editor Tara Seals is joined by Russ Mohr, engineer and Apple evangelist at MobileIron along with Jerry Ray, COO at SecureAge, for a discussion about the now postponed Tokyo Games and its use of 5G and the myriad of security concerns Japan is preparing for.

Covid-19 Privacy Poll: Phone Tracking, Public Health and Surveillance

Is sacrificing your personal privacy worth flattening the coronavirus infection curve? Weigh in on our Threatpost poll.

By |2020-03-24T16:58:21-04:00March 24th, 2020|Biometrics, coronavirus, COVID-19, Data Privacy, facial recognition, flattening the curve, infection tracking, IoT, location tracking, mobile phone, Mobile Security, privacy|Comments Off on Covid-19 Privacy Poll: Phone Tracking, Public Health and Surveillance

Hackers Actively Exploit 0-Day in CCTV Camera Hardware

Criminals behind botnets Chalubo, FBot and Moobot attack unpatched vulnerabilities in the commercial DVRs made by LILIN.

By |2020-03-23T16:35:38-04:00March 23rd, 2020|Botnets, CCTV cameras, Chalubo, DDoS, dvr, FBot, Internet of Things, IoT, ip video camera, lilin, Mirai botnet, Moobot, network time protocol, NTPDate, Qihoo 360, Vulnerabilities, vulnerability|Comments Off on Hackers Actively Exploit 0-Day in CCTV Camera Hardware

Coronavirus Poll: Cyberattacks Ramp Up as Work from Home Takes Hold

A poll of Threatpost readers shows that security preparedness is uneven as organizations make an unprecedented transition to remote working.

By |2020-03-19T17:49:29-04:00March 19th, 2020|Cloud Security, coronavirus, COVID-19, Critical Infrastructure, Government, Hacks, IoT, Malware, Mobile Security, remote working, results, security preparedness, threatpost poll, Vulnerabilities, Web Security, work from home|Comments Off on Coronavirus Poll: Cyberattacks Ramp Up as Work from Home Takes Hold

More Than Half of IoT Devices Vulnerable to Severe Attacks

A full 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network.

By |2020-03-11T09:56:58-04:00March 11th, 2020|botnet, Conficker Worm, Connected Device, Cybersecurity, DDoS, Encryption, IoT, IoT Device, IoT security, Malware, may wang, medical iot, Palo Alto Networks, Podcasts, Ryan Olson, top threats, Unit 42|Comments Off on More Than Half of IoT Devices Vulnerable to Severe Attacks

Forrester: Keeping Smart Cities Safe From Hacks

As cities grow more connected, municipal operators must deal with new risks like ransomware, IoT hacks and more.

RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity

CEO Mary T. Barra addressed the high stakes in rolling out self-driving cars and biometric-enhanced vehicles, where one cyber-event could derail plans for emerging automotive technologies.

By |2020-02-27T16:58:12-05:00February 27th, 2020|bug bounty, Cloud Security, Critical Infrastructure, IoT, Mobile Security, privacy, RSAC, Vulnerabilities|Comments Off on RSAC 2020: GM’s Transportation Future Hinges on Cybersecurity

Billions of Devices Open to Wi-Fi Eavesdropping Attacks

The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.

By |2020-02-26T23:07:18-05:00February 26th, 2020|apple devices, Broadcom, Cryptography, CVE-2019-15126, cypress, Encryption, IoT, kr00k, KRACK, Mobile Security, RSAC, security flaw, Vulnerabilities, vulnerability, wi-fi chips|Comments Off on Billions of Devices Open to Wi-Fi Eavesdropping Attacks