AN ELABORATE HACK SHOWS HOW MUCH DAMAGE IOT BUGS CAN DO

AN ELABORATE HACK SHOWS HOW MUCH DAMAGE IoT BUGS CAN DO | #TpromoCom #IoT #Hacker #Security #Data | The bulk of major corporate hacks follow time-tested strategies, like phishing emails that trick employees into giving up their credentials, or hackers exploiting a bug in a web portal. While effective, these strategies also open an attacker to early detection. So increasingly, hackers have taken the scenic route—through the Internet of Things.

Vulnerabilities in internet-connected devices are well-documented by this point, but the most common exploitations generally involve conscripting thousands of vulnerable IoT devices into botnets, or getting onto a network through a weak IoT device for ransomware attacks. These aren’t using data-stealing missions. But researchers from the IoT security firm Senrio have shown that a company’s publicly exposed IoT devices can form an unsupervised backroad path into networks. Attackers can jump from one vulnerable IoT device to the next, totally bypassing mainstream devices like PCs and servers, and charting a course that’s much harder to detect.

“No matter what we do, no matter how good our IT people may be, there’s going to be a hacker out there with more skill, more criminality ingrained into his being than all of us put together. When it comes right down to it, like physical security, it’s not a matter of ‘if’ there’ll be a data breach in our network, but rather ‘when.'” –Al Colombo

To read the remainder of this informative article, click here.

Please follow and like us:

UK’s NCSC says national security risk from equipment from China’s ZTE cannot be mitigated

UK’s NCSC says national security risk from equipment from China’s ZTE cannot be mitigated  | #TpromoCom #China #Telco #Spy |  Britain’s main cyber security agency said on Monday it had written to organizations in the UK’s telecommunications sector warning them about using services or equipment from Chinese telecom equipment maker ZTE Corp.

“NCSC assess that the national security risks arising from the use of ZTE equipment or services within the context of the existing UK telecommunications infrastructure cannot be mitigated,” said Ian Levy, the Technical Director of the National Cyber Security Center.

As the cold war with China heats up, it’s obvious that there’s no length to which either side will go to stay ahead of the other. And then again, I recall shipments of digital telco switches that were shipped to  China from the United  States in the 1990’s that had “back doors” installed in the software. Tit for tat is the name of the game and we’re going to see a whole lot more of this in the near future. –Al Colombo

To read the original news story, click here.

Please follow and like us:

Alarm.Com for Business

Alarm.Com for Business | #TpromoCom #CentralStation #AlarmSystem #HomeAutomation | Alarm.com has launched Alarm.com for Business, a fully integrated, smarter security solution for small-to-medium sized businesses (SMBs).

Alarm.com for Business is the first offering to combine intelligent intrusion detection, video surveillance, access control and energy management into a single solution, the company said. Easily controlled through Alarm.com’s app and online interfaces, the solution offers proactive security safeguards, visibility and awareness, and efficient automation of everyday tasks. Alarm.com for Business gives Alarm.com service providers a highly differentiated offering for SMB customers, delivering exceptional value to business owners and generating RMR for the service provider while simplifying installation and ongoing customer service.

To read the remainder of this news story, click here.

Please follow and like us:

Robot Lures Industrial Hackers to Help ID Them

Robot Lures Industrial #Hackers to Help ID Them | #TpromoCom #Industry #Hacker #CyberSecurity |  Hey, hackers: The Georgia Institute of Technology wants you to know that your attempts at industrial espionage will not be taken lying down. You just might not realize you’re being attacked back when lulled into a false sense of security by the adorable, shoebox-sized HoneyBot.

Researchers have designed a way for industrial companies to prevent their robots from being overtaken by cyber threats. Recent advancements in automation within the Industrial Internet of Things (IIoT) mean more and more robots are at-risk, with the possibility of hackers taking control of a product or manufacturing process, resulting in damage or – even worse – trying to harm nearby humans. To read the remainder of this  news story, click here.

Please follow and like us:

Would Facebook and Cambridge Analytica be in Breach of GDPR?

Would Facebook and Cambridge Analytica be in Breach of GDPR? | #TpromoCom #Facebook #GDPR #CyberSecurity |  The Cambridge Analytica (CA) and Facebook accusations over the U.S. 2016 presidential election campaign, and to a lesser extent between CA and the UK’s Brexit VoteLeave campaign, are — if proven true — morally reprehensible. It is not immediately clear, however, whether they are legally reprehensible. The matter is currently under investigation on both sides of the Atlantic.

On March 26, both Apple and IBM called for more regulatory oversight on the use of personal data. “I’m personally not a big fan of regulation because sometimes regulation can have unexpected consequences to it, however I think this certain situation is so dire, and has become so large, that probably some well-crafted regulation is necessary,” said Apple chief Tim Cook on March 24, 2018. To read the remainder of this news story, click here.

GDPR - European Data Protection

Please follow and like us:

Privacy, Data Woes Pile Up for Facebook and Google

#Privacy, #Data Woes Pile Up for #Facebook and #Google | #TpromoCom # # # |  As the fallout continues from recent news reports detailing how Facebook enabled “digital warfare” based on its users’ personal data, Google is also facing heat for the vast troves of information it collects about people.

To read this interesting and informative news story, click here.

Privacy, Data Woes Pile Up for Facebook and Google

Please follow and like us:

150 million MyFitnessPal accounts compromised – here’s what to do

150 million #MyFitnessPal accounts compromised – here’s what to do | #TpromoCom #Data #Hacker #Hackers |  Under Armour’s hugely popular fitness tracker, MyFitnessPal, has been hacked. If you’re one of the 150 million or so users of the app or website don’t panic, but do change your password.

If you use Facebook to log in to MyFitnessPal you do not need to change your Facebook password.

If you use your MyFitnessPal password on any other websites, change your password on those websites – choose a different, strong password for each one (consider using a password manager if that sounds too difficult).

To read the remainder of this informative news story, click here.

Please follow and like us:

Facebook and Cambridge Analytica: Data Scandal Intensifies

Facebook and Cambridge Analytica: Data Scandal Intensifies | #TpromoCom #Facebook #DataBreach #Political | Regulators, attorneys general and lawmakers in the U.S., U.K. and Canada continue to spring into action to try and unravel the events that led to the personal information of as many as 60 million Facebook users leaking to a voter-profiling firm.

“Why am I not at all surprised that Facebook would leak personal information belonging to 60M Facebook members to a  political profiling oriented firm? It makes perfect sense if you think about it, especially since we know how Facebook interfered with a major presidential election on behalf of Obama” says Al Colombo, owner and operator of www.SecurityeNews.com.

To read the remainder of this news story, click here.

Facebook and Cambridge Analytica: Data Scandal Intensifies

Please follow and like us: