Month: April 2019

IndependentKrebs

How Not to Acknowledge a Data Breach

Credit to Author: BrianKrebs| Date: Wed, 17 Apr 2019 17:56:58 +0000

I’m not a huge fan of stories about stories, or those that explore the ins and outs of reporting a breach. But occasionally it seems necessary to publish such accounts when companies respond to a breach report in such a way that it’s crystal clear that they wouldn’t know what to do with a breach if it bit them in the nose, let alone festered unmolested in some dark corner of their operations.

Read More
MalwareBytesSecurity

Malware targeting industrial plants: a threat to physical security

Credit to Author: Pieter Arntz| Date: Wed, 17 Apr 2019 16:04:20 +0000

When malware shuts down the computer systems of an industrial plant, it could threaten the physical security of those working in or living near it. Here’s how to protect your workforce and your business from targeted threats.

Categories:

Tags:

(Read more…)

The post Malware targeting industrial plants: a threat to physical security appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

What Did We Learn from the Global GPS Collapse?

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 17 Apr 2019 13:00:24 +0000

On April 6, 2019, a ten-bit counter rolled over. The counter, a component of many older satellites, marks the weeks since Jan 1, 1980. It rolled over once before, in the fall of 1999. That event was inconsequential because few complex systems relied on GPS. Now, more systems rely on accurate time and position data:…

The post What Did We Learn from the Global GPS Collapse? appeared first on .

Read More
SecurityTrendMicro

Is Your Baby Monitor Susceptible to Hacking?

Credit to Author: Trend Micro| Date: Wed, 17 Apr 2019 12:00:19 +0000

There’s no doubt that digital technology, in many of its forms, brings everyday tasks much closer-to-hand. From discovering breaking news, to online shopping, to keeping tabs on your home via security cameras—everything is within the touch of a button. Even so, with the growing reach of the Internet of Things (IoT), new and unsuspected threats…

The post Is Your Baby Monitor Susceptible to Hacking? appeared first on .

Read More