Nest Cams Hijacked in the Name of PewDiePie and North Korea Pranks

Credit to Author: Lily Hay Newman| Date: Wed, 23 Jan 2019 20:38:38 +0000
In separate incidents, hackers exploit poor password hygiene to terrify camera owners.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Wed, 23 Jan 2019 20:38:38 +0000
In separate incidents, hackers exploit poor password hygiene to terrify camera owners.
Read MoreCredit to Author: Trend Micro| Date: Thu, 24 Jan 2019 14:20:08 +0000

Ever since certain solutions have begun being offered “as-a-service,” the market for this method of delivery has exploded. Now, elements like software-as-a-service, infrastructure-as-a-service and platform-as-a-service are key mainstay components of enterprise IT, with the market values to prove it. According to MarketWatch, the global SaaS market is on track to expand by a more than…
The post Impacts to Enterprise Security: A Look at as-a-service Attacks appeared first on .
Read MoreCredit to Author: Trend Micro| Date: Wed, 23 Jan 2019 14:14:39 +0000

Advanced technology has changed countless facets of everyday life, from internal enterprise processes to consumer pursuits and beyond. Even the design, management and support for large and small cities has shifted thanks to innovative smart city systems. While advanced components to support utilities, critical infrastructure, traffic and more can bring numerous benefits, these solutions also open…
The post Protecting Critical Infrastructure and Roadways: How Smart Cities Create New Risks appeared first on .
Read MoreCredit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 22 Jan 2019 14:00:18 +0000

In our predictions report for 2019, “Mapping the Future: Dealing with Pervasive and Persistent Threats,” we foresaw an increase in the rate of BEC (business email compromise) attacks: “Business email compromise will go two levels down in the org chart.” From the report: “Business email compromise (BEC) remains a very potent and…
The post BEC Will Reach Two Levels Deeper appeared first on .
Read More
Credit to Author: Jonathon Keats| Date: Mon, 21 Jan 2019 11:00:00 +0000
It takes a master demagogue to weaponize unstable individuals and aim them at political enemies.
Read MoreCredit to Author: Shriram Munde| Date: Mon, 21 Jan 2019 07:37:49 +0000
Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for the attackers to deliver the malware to targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are…
Read More
Credit to Author: Lily Hay Newman| Date: Sun, 20 Jan 2019 12:00:00 +0000
Sharing is caring. But it’s worth checking if your streaming accounts have picked up any suspicious stragglers along the way
Read More
Credit to Author: Brian Barrett| Date: Sat, 19 Jan 2019 14:00:00 +0000
Trump dominated security headlines this week, but there’s plenty of other news to catch up on.
Read More