Month: May 2017

FortinetSecurity

Byline: Will Automated Next Gen Cybersecurity be Based on Intent?

Credit to Author: Ken McAlpine| Date: Wed, 03 May 2017 08:22:17 -0700

Over the last few months I’ve written about a number of technologies impacting cybersecurity and how in a perhaps idealistic world these security systems can all interact with each other, share information about the devices in our networks, and take mitigating actions, as required. So where does that leave us for improving our overall approach to information security as it relates to rapidly evolving networked systems?

Read More
SecurityTrendMicro

Industrial Robots are Hackable: How Do We Fix Them?

Credit to Author: Jon Clay| Date: Wed, 03 May 2017 12:00:30 +0000

Discuss cyber attacks involving robots and many people might think you’re talking about the latest Hollywood blockbuster to hit the screens. The reality, however, is that industrial robotic systems now form a vital cog in the manufacturing process of everything from silicon chips to cars and even glassware. A new Trend Micro report, Demonstrating Industrial…

Read More
ComputerWorldIndependent

The Internet of messy things

Credit to Author: Steven J. Vaughan-Nichols| Date: Wed, 03 May 2017 04:00:00 -0700

In the beginning, devices on the internet were fun. My favorite was the Carnegie-Mellon’s Computer Science Department Coke Machine. Starting in the 1970s, you could “ping” it to see if it had sodas ready and if they were cold yet. It was good, silly fun. Now everything except the cat* is hooked to the internet, and that’s not so funny at all.

Oh, sure, some internet of things (IoT) devices are enjoyable and useful. I have an Amazon Echo in my bedroom and a Google Home in my kitchen. I use them every day. But I’m aware of their privacy problems. You should be too.

To read this article in full or to leave a comment, please click here

Read More
QuickHealSecurity

6 Tips to Protect Your Kids from Cyberbullying

Credit to Author: Rajib Singha| Date: Wed, 03 May 2017 05:30:22 +0000

Cyberbullying is defined as the use of the Internet and mobile technologies to bully, especially amongst children and teenagers. It not only affects the academic career of kids but also adversely impacts their physical, social, and mental well-being. This post lists 6 tips to protect your kids from cyberbullying.  …

The post 6 Tips to Protect Your Kids from Cyberbullying appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More
IndependentSecuriteam

SSD Advisory – Serviio Media Server Multiple Vulnerabilities

Credit to Author: Maor Schwartz| Date: Tue, 02 May 2017 10:58:33 +0000

Vulnerabilities Summary The following advisory describes a five (5) vulnerabilities found in Serviio Media Server. Affected version: 1.8.0.0 PRO, 1.7.1, 1.7.0, 1.6.1. Serviio is a free media server. It allows you to stream your media files (music, video or images) to renderer devices (e.g. a TV set, Bluray player, games console or mobile phone) on … Continue reading SSD Advisory – Serviio Media Server Multiple Vulnerabilities

Read More