After breach, researcher reveals CloudPets toy can be used to spy on kids
Anyone can connect to a CloudPets toy as long as they're in Bluetooth range.
Anyone can connect to a CloudPets toy as long as they're in Bluetooth range.
The removal of administrator rights and imposition of application control policies can stop ransomware dead in its tracks, new research from CyberArk Labs has found as a number of security players become more confident in their ability to block ransomware infections before they cause damage.
David Braue | 03 Aug | Read more
Google’s score-based system that it hopes will replace passwords for apps should be available to all Android developers by the end of the year.
A more than doubling of Internet of Things (IoT) usage in 2015 has seen Verizon bring forward its projections around the segment's growth, highlighting security fears around the emergent technology with businesses only starting to take advantage of the data they are collecting from IoT devices.
David Braue | 06 Apr | Read more
Strong adoption of hybrid application models reflects corporations' growing appetites for change but security remains a serious concern in the infrastructure refresh, according to a new survey of Australian IT professionals in which only 1 in 3 respondents said they have enough skills and resources to manage the change.
David Braue | 05 Apr | Read more
Google has released its April update for Nexus devices, which includes fixes for 40 bugs altogether, including 15 critical issues and a rooting flaw it addressed in March.
Security teams are overwhelmed with a massive amount of threat data. While a decade ago no one was talking about threat intelligence except government agencies, organizations are now bombarded with threat data leaving them challenged with identifying what is relevant.
Kacy Zurkus | 14 Aug | Read more
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
Katherine Noyes | 13 Aug | Read more
Two-factor authentication is often held up as a best practice for security in the online world, but Dropbox on Wednesday announced a new feature that's designed to make it even tougher.
Katherine Noyes | 13 Aug | Read more
Some Apple mobile users have been encountering a pop-up message that is particularly difficult to close.
Jeremy Kirk | 03 Aug | Read more
The comment period on a proposed set of software export restrictions ends next Monday, and the rules, as written, would severely restrict international sales, deployment, research and even discussion of cybersecurity tools and exploits, experts say.
Maria Korolov | 16 Jul | Read more
Symantec has identified a group of cybercriminals, whom they've named "Morpho," as targeting corporate intellectual property for financial gains, with Twitter, Facebook, Apple and Microsoft among those hit.
Maria Korolov | 14 Jul | Read more
As government officials continue to plea the case against strong encryption, a group of high-profile international security experts have published a paper arguing that allowing government agents special access to communications would have detrimental effects on personal privacy, enterprise security, and our national economy.
Maria Korolov | 10 Jul | Read more
It's no secret that security has been a tripping point for enterprises considering cloud storage, but OwnCloud on Tuesday took a fresh step toward alleviating such concerns with the addition of a new encryption framework.
Katherine Noyes | 08 Jul | Read more
The security problems over at the Office of Personnel Management (OPM) are still the leading story in the news lately.
Steve Ragan | 01 Jul | Read more