All posts in Security
Flashpoint and Risk Based Security’s report found that, despite early reports, the total number of breaches is likely much higher than reported, with the time it takes to report a breach the longest since 2014. The post Report: Data breach numbers may not actually be declining, and reporting them is . . . Read more

by Harriet Stone TikTok is a video-sharing social media platform, owned by Chinese company ByteDance, where users make and share short-form videos that range from three seconds to one minute long. It’s the latest app to take its turn on the social media throne, following MySpace in 2005, Facebook in . . . Read more
The “People Nearby” feature in the secure messaging app can be abused to unmask a user’s precise location, a researcher said.
21 Dec, 2020
attribution, blue team, IOCs, Podcasts, red team, Security, security defense, Security News, security playbook, ttps
0
Fortinet’s Derek Manky talks about how threat playbooks can equip defense teams with the tools they need to fight back against evolving attacker TTPs.
15 Dec, 2020
Breach, CT scans, data leak, DICOM, medical data, mri, network attached storage, personal healthcare information, PHI, PII, Security, Security News, sensitive data, X-ray
0

A six-month investigation by CybelAngel discovered unsecured sensitive patient data available for third parties to access for blackmail, fraud or other nefarious purposes. More than 45 million medical images—and the personally identifiable information (PII) and personal healthcare information (PHI) associated with them–have been left exposed online due to unsecured technology . . . Read more
10 Dec, 2020
connnected speakers, consumer grade routers, cyber monday, eCommerce, IoT devices, Podcasts, Privacy, retail threats, router, Security, Security News, Vulnerabilities, Web Security
0

From eCommerce threats, to attacks at the smart edge, Fortinet researchers discuss the top evolving threats of 2020, heading into the new year. Derek Manky Though eCommerce threats are usually only top-of-mind during the holiday shopping season, researchers have been on high alert when it comes to cybercriminal activity in . . . Read more
07 Dec, 2020
COVID-19, Critical Infrastructure, cyberattack, data theft, eBook, Healthcare, HIPPA, Hospital, IoT, Malware, patient data privacy, Ransomware Attack, Security, Security News, UVM health network, Vulnerabilities
0
As hackers put a bullseye on healthcare, Threatpost spotlights how hospitals, researchers and patients have been affected and how the sector is bolstering their cyber defenses.
02 Dec, 2020
Apple, google, Google Project Zero, ian beer, iOS, iPadOS, iPhone, ipod, memory corruption bug, Mobile Security, Radio, Security, Security News, threat actors, update, Vulnerabilities, Wireless
0

Researcher Ian Beer from Google Project Zero took six months to figure out the radio-proximity exploit of a memory corruption bug that was patched in May. Details tied to a stunning iPhone vulnerability were disclosed by noted Google Project Zero researcher Ian Beer. Apple patched the vulnerability earlier this year. . . . Read more
24 Nov, 2020
attack, Bluetooth Low Energy, COSIC, electric vehicles, hack, Hackers, Hacks, key fob, keyless entry, Lennert Wouters, Security, Security News, Tesla, Tesla Model S, Tesla model X, Vulnerabilities, Wireless
0
Belgian researchers demonstrate third attack on the car manufacturer’s keyless entry system, this time to break into a Model X within minutes.
17 Nov, 2020
Apple, apps, Big Sur, desktop, Developers, firewall, flaw, macOS, Privacy, Security, Security News, software, vpn, Vulnerabilities, Vulnerability, Web Security
0

Attackers can exploit the feature and send people’s data directly to remote servers, posing a privacy and security risk, researchers said. Security researchers are blasting Apple for a feature in the latest Big Sur release of macOS that allows some Apple apps to bypasses content filters and VPNs. They say . . . Read more