Security Gotcha of Consumer and Industrial IoT Devices

Security Gotcha of Consumer and Industrial IoT Devices

By Smit Kadakia, Chief Data Scientist, Seceon Inc. Internet of Things (IoT) and Industrial IoT (IIoT) are not just buzzwords anymore. The broad use of these devices and their impact on our society and modern businesses is changing our everyday life in a way that was unimaginable even a decade ago. Always-on visibility of intruders to your home, precise control of your energy use, and the remote control of your garage and car doors are…

Read More

Google Chrome Extensions Could Be Used to Track Users Online

Google Chrome Extensions Could Be Used to Track Users Online

Web developer ‘z0ccc’ has created a website designed to generate a fingerprint of devices based on Google Chrome extensions installed on the visiting browser.  In an exclusive email interview with Bleeping Computer, z0ccc said while the website does not store the fingerprint of visiting devices, the testing shows that information could be potentially used by malicious actors to track users. From a technical standpoint, this fingerprinting action is possible due to a feature of Chrome browser extensions…

Read More

Former Amazon Worker Convicted of Capital One Data Breach

Former Amazon Worker Convicted of Capital One Data Breach

A former Amazon Web Services (AWS) employee was convicted of multiple crimes connected to one of the largest US data breaches of all time. Paige Thompson, 36, acting under the handle ‘erratic,’ would have obtained the personal information of more than 100 million people in the infamous Capital One hack in 2019 using a tool she built that searched for misconfigured accounts on AWS. For context, the data breach prompted the company to reach a $190m settlement…

Read More

QNAP investigating new Deadbolt ransomware attacks

QNAP investigating new Deadbolt ransomware attacks

<!– QNAP investigating new Deadbolt ransomware attacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

BRATA Android Malware Group Now Classified As Advanced Persistent Threat

BRATA Android Malware Group Now Classified As Advanced Persistent Threat

Cybersecurity expert group Cleafy said the threat actors behind the BRATA Android malware are now operating according to an Advanced Persistent Threat (APT) activity pattern. Writing in a blog post on Friday, Cleafy confirmed it first detected three main BRATA variants at the end of 2021, mainly in Great Britain, Italy and Spain. The hacker group would have then changed its attack patterns in recent months. “Threat Actors behind BRATA now target a specific financial…

Read More

CYBER.ORG joins Microsoft’s TEALS program

CYBER.ORG joins Microsoft’s TEALS program

<!– CYBER.ORG joins Microsoft’s TEALS program | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

11 steps to build the foundation of a school security and safety program

11 steps to build the foundation of a school security and safety program

<!– 11 steps to build the foundation of a school security and safety program | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

How hackable is your WiFi network?

How hackable is your WiFi network?

<!– How hackable is your WiFi network? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

The hacker stole my homework — the education industry faces its greatest test

The hacker stole my homework — the education industry faces its greatest test

<!– The hacker stole my homework — the education industry faces its greatest test | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

How investment and savings platform PiggyVest is changing Nigeria’s youth culture

How investment and savings platform PiggyVest is changing Nigeria’s youth culture

With around 3.7 million users, PiggyVest is a platform that makes it easier for the average Nigerian to save and invest. According to COO and co-founder Odun Eweniyi, PiggyVest allows people to automate their savings so they can achieve big ambitions like buying a car, funding a goal to continue studying or starting a business. Here, she talks about why she and her co-founders wanted to create a platform that democratises saving and investing to…

Read More
1 2,947 2,948 2,949 2,950 2,951 4,118