McAfee Security Alert: Protect Your Smart Cameras and Wi-Fi Baby Monitors

McAfee Security Alert: Protect Your Smart Cameras and Wi-Fi Baby Monitors

An important alert for anyone who uses smart cameras, Wi-Fi baby monitors, and other connected  devices that send audio or video over the internet: a recent security advisory indicates millions of these devices may be at risk of remote monitoring or attack.  The root of the concern is an apparent vulnerability in the Software Development Kit (“SDK”) used with the ThroughTek Kalay network. Millions of smart devices use Kalay and its protocols to communicate over the internet.  As mentioned in the security advisory, an attacker could exploit the apparent vulnerability to intercept audio and video signals sent to…

Read More

How Cyber Insurance Can Protect Your Business from Breach of Privacy Claims

How Cyber Insurance Can Protect Your Business from Breach of Privacy Claims

By Irena Ducic, Growth Marketer, Embroker Article text: Every company that stores and handles sensitive customer, partner, or vendor information has the responsibility to protect that data from a variety of potential attackers. If this data is stolen or its privacy compromised in any way, the company can be held liable for such incidents. These types of claims can potentially cost your company a lot of money, not just in settlements or damages, but also…

Read More

Why it’s important to create a common language of cyber risk

Why it’s important to create a common language of cyber risk

All departments of an organization need to be on the same page where cybersecurity is concerned, and that will only happen if the terminology used is understood by all. Image: iStockphoto/anyaberkut Things work better when everyone is on the same page, and that includes the ability to discuss a topic using language that imparts the same meaning to all.  SEE: Security incident response policy (TechRepublic Premium) There’s a party game—Whisper Down the Lane, known in…

Read More

Women Charged Over Sexually Exploitative Child Modeling Sites

Women Charged Over Sexually Exploitative Child Modeling Sites

Four Floridians have been charged in connection with a child sexual abuse material (CSAM) subscription service that produced millions of images and videos of sexualized minors.  International Florida-based business Newstar Enterprise, which was founded in 2005, built, maintained, hosted, and operated what appeared to be a series of legitimate child modeling websites called Newstar Websites on servers based in the US and abroad. According to court documents, Newstar was in reality “an internet-based business aimed…

Read More

New analysis of Diavol ransomware reinforces the link to TrickBot gang

New analysis of Diavol ransomware reinforces the link to TrickBot gang

Researchers conducted a new analysis of the Diavol ransomware and found new evidence of the link with the gang behind the TrickBot botnet. In July, researchers from Fortinet reported that a new ransomware family, tracked as Diavol, might have been developed by Wizard Spider, the cybercrime gang behind the TrickBot botnet. The Trickbot botnet was used by threat actors to spread the Ryuk and Conti ransomware families, experts noticed similarities between Diavol and Conti threats. Unlike Conti, Diavol doesn’t avoid infecting…

Read More

How to configure SSH access through Webmin

How to configure SSH access through Webmin

Looking for an easier way to configure SSH on your data center servers? How about Webmin? Jack Wallen walks you through some of the options for better SSH security using this web-based GUI. Nearly every Linux server I administer is done via SSH. Given that I’ve been working with Linux for over 20 years, configuring SSH with an eye on security is pretty simple for me. But most often I’m doing this on smaller deployments,…

Read More

T-Mobile breach exposed personal data of almost 50 million people

T-Mobile breach exposed personal data of almost 50 million people

Attackers captured the names, dates of birth, Social Security numbers and driver’s license numbers of millions of current, former and potential T-Mobile customers. Getty Images/iStockphoto A cyberattack against T-Mobile has compromised the personal information of almost 50 million people, according to the carrier. In an update posted on Tuesday, the company said that certain customer data had been accessed and stolen by unauthorized individuals and that the data did include some personal information for a…

Read More

Coin Ninja CEO Admits Operating Darknet Bitcoin Mixer

Coin Ninja CEO Admits Operating Darknet Bitcoin Mixer

A CEO from Ohio has pleaded guilty to being the operator of a darknet-based Bitcoin ‘mixer’ service that laundered more than $300m Akron resident and CEO of Bitcoin media site Coin Ninja Larry Dean Harmon was at the helm of underground cryptocurrency laundering service Helix for three years, from 2014 to 2017.  During that time, the 38-year-old creator of crypto-wallet provider DropBit conspired with darknet vendors to launder over 350,000 Bitcoin generated through drug trafficking and other illegal activities. Helix partnered with…

Read More

83 million devices using the Kalay protocol are at risk for remote takeover. Are yours?

83 million devices using the Kalay protocol are at risk for remote takeover. Are yours?

ThroughTek’s Kalay is used to manage security cameras, baby monitors, DVRs and more. A newly discovered flaw lets attackers watch, listen and steal recordings from hardware sold by dozens of vendors. Getty Images/iStockphoto Kalay, a P2P IoT protocol developed by Taiwanese company ThroughTek, has a serious security problem: Remote attackers are able to exploit it in order to give them total, yet nearly invisible, control over devices using the protocol. The problem isn’t a minor…

Read More

Geisinger Medical Center receives Program of Distinction award

Geisinger Medical Center receives Program of Distinction award

Geisinger Medical Center receives Program of Distinction award | 2021-08-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2,138 2,139 2,140 2,141 2,142 2,594