Apple iOS patching error, MoviePass data breach New Facebook privacy controls
You listen to the shared security podcast and discover the confidence you place in people, applications and technology… with your host, Tom Eston. Facebook announces new off-Facebook privacy controls, how Apple made everybody’s iOS system vulnerable and details of the massive MoviePass data breach in episode 83 of August 26, 2019. This week I read
[ Read More ]7 Big Factors that makes Small Business at Risk
Small organizations still face a long list of threats to security. These threats and vulnerabilities should take precedence. Increasingly, cyber criminals are targeting smaller organisations. This makes small and medium-sized enterprises (SMBs) hard to find. They are also working with smaller budgets and staff constraints in the face of a long list of cyber threats,
[ Read More ]Australia Banks warn Customers of a fresh PayID data violation
Banks have begun to warn customers of a new PayID data breach, which was reported late Friday to the NPP Australia new payment platform supervision. NPP Australia said that an unrevealed number of PayID records “and associated data in the Addressing Service were exposed by a vulnerability in one of the financial institutions sponsored into
[ Read More ]Google Nest Cam IQ vulnerabilities can be used to hide the camera, leak data
The indoor security device was vulnerable to user privacy bugs. The indoor camera of Google Nest Cam IQ contained a wealth of security vulnerabilities that could be used to hide or disrupt the device. Lilith Wyatt and Claudio Bozzato from the Cisco Talos research team said on Monday that a number of major vulnerabilities existed in
[ Read More ]All about Malware Trade and it’s Psychological Tricks
As a professional services consultant, I am pleased to meet customers around the world and talk to a wide range of IT security experts who are at the forefront of malware defence. One of my favorite topics is how people have started their IT careers, but I am frequently surprised by the number of people
[ Read More ]Is Cloud-Computing An Inevitable Infrastructure To Embrace?
As the practical application of cloud computing becomes cheaper, there are still many people who still have vague anxieties about security. Examine the security of the public cloud itself and the dangers hidden in the operation of users, and explain the security strategy that should be considered in cloud utilization. The safety and security of
[ Read More ]Common Ways For Countering Privileged Identity Theft Attacks
Work efficiency cannot be improved without an internal/external network environment these days; successful organizations are all data-driven entities. However, while the Internet comes with convenience, there is a risk of leaking personal information. There are various causes of identity theft, but one is sophisticated of malware such as targeted attack emails. Targeted attack emails are
[ Read More ]Is North Korea Engaging With Cryptocurrency Cyberheist?
As reported by the Associated Press, some United Nations agents are investigating North Korea for allegedly launching 35 coordinated state-sponsored cyber attacks activities against 17 countries. The attacks were allegedly linked to the hermit country’s goal of raising enough funds to continue their weapons upgrade program. According to the Associated Press, North Korean regime was
[ Read More ]Artificial Intelligence: Ally Or Enemy Of System Security?
The term “artificial intelligence” is now a keyword that has attracted a great deal of attention in the technological development of various fields. Image recognition, speech analysis, human interaction, medical use, surveillance camera security and economic analysis have an innovative impact on data management in the current day when data handling is commonplace. The existence
[ Read More ]Decade-old Avaya Phone Security Flaw, Patched At Last
Who can ever forget of Avaya phones and its near-monopoly of the corporate communication equipment market for Fortune 100 companies pre-Skype? As software VOIP solutions matured, companies are slowly but surely migrating away from hardware-based VOIP phones, including Avaya. For the last 10 years that Avaya ruled the offices, it harbored a remote code execution
[ Read More ]