Russian Trolls Manipulated Top Social Networks to Influence Election

Russian Trolls Manipulated Top Social Networks to Influence Election

by Luana PASCU, from HotForSecurity , on 18.12.2018

The Kremlin and its trolls went out of their way to ensure Trump’s victory in the 2016 presidential election, found a report commissioned by the Senate Intelligence Committee and obtained by The Washington Post. Although they provided the government with data, Facebook, Twitter and Google could have been more involved by delivering more valuable data [and#8230;] read more

Passwords in 2018 are as bad as ever, report shows

Passwords in 2018 are as bad as ever, report shows

by Filip TRUTA, from HotForSecurity , on 18.12.2018

Every year, the fine gents at SplashData both entertain and horrify us with a list of the 100 worst passwords out there, hoping to kick our collective bad habits. Despite increased awareness of the need for password hygiene, people still use the same weak login credentials. This year is no different, as the report reveals. [and#8230;] read more

Old routers form a weak link in your network security

Old routers form a weak link in your network security

by Ionut ILASCU, from IoT Security Insights , on 18.12.2018

Old equipment comes with security issues that may never receive fixes from the manufacturer. Routers, the most important element in the modern home, are prone to becoming outdated since they are typically used longer than the manufacturer will provide support, making them a certain target for hackers. A recent example comes with the discovery of ... The post Old routers form a weak link in your network security appeared first on Bitdefender. read more

US Couldn’t Handle Catastrophic Cyberattack on Power Grid, Government Warns

US Couldn’t Handle Catastrophic Cyberattack on Power Grid, Government Warns

by Business Insights , on 18.12.2018

Key infrastructures are in the crossfire of cyberwarfare. Growing threats and sophisticated nation-state attacks backed by North Korea, China and Russia jeopardize public safety and national security. Which one is the bigger threat? read more

What parents need to know about Yahoo! Answers

What parents need to know about Yahoo! Answers

by Cristina POPOV, from IoT Security Insights , on 18.12.2018

What is it? Yahoo! Answers is a question-and-answer (Qand#38;A) website, where users can ask questions and have them answered by strangers. Under the cover of anonymity, people ask virtually any question imaginable, and receive all kinds of answers. Questions and answers are organized into categories; anyone can browse to form an idea about the latest ... The post What parents need to know about Yahoo! Answers appeared first on Bitdefender. read more

Bandwidth Security Is Critical in Wake of Rogue IoT Botnets Targeting Telecom Sector

Bandwidth Security Is Critical in Wake of Rogue IoT Botnets Targeting Telecom Sector

by Business Insights , on 17.12.2018

Bandwidth security against rogue IoT botnets could be the next critical investment priority for the telecommunications sector after a report from NOKIA found that 78 percent of network-based malware detection in CSP networks in 2018 is attributed to IoT botnet activity used in DDoS and crypto-mining activity. This is up a staggering 33 percent from two years ago, confirming that malware is here to stay and growing in complexity. read more

Top IoT Trends to Watch for in 2019, Forrester Research

Top IoT Trends to Watch for in 2019, Forrester Research

by Luana PASCU, from IoT Security Insights , on 14.12.2018

Consumers seem to enjoy the benefits of IoT technology and solutions. They love being connected and regularly purchase smart devices, believing in automation and how the improvement it brings to their lives. According to a study of US adults, 70 percent think connected devices are very easy to install, but they still consider them extremely ... The post Top IoT Trends to Watch for in 2019, Forrester Research appeared first on Bitdefender. read more

Bitcoin Scammers Launch International Bomb Threat Hoax across US, Canada, Australia, New Zealand

Bitcoin Scammers Launch International Bomb Threat Hoax across US, Canada, Australia, New Zealand

by Luana PASCU, from HotForSecurity , on 14.12.2018

An emailed bomb threat hoax sent Thursday afternoon has terrorized businesses and organizations across the US, Canada, Australia and New Zealand. Claiming to have planted bombs all over the building, the email demands ransom in bitcoin or the bombs will be detonated. The email extortion scam, which states “I advise you not to call the [and#8230;] read more

What parents need to know about Musical.ly

What parents need to know about Musical.ly

by Cristina POPOV, from IoT Security Insights , on 14.12.2018

What is it? Musical.ly is a free social media app that allows users (named “musers”) to create 15-second videos with a music soundtrack. Videos can be shared and commented on through a network of followers. Instagram-like filters, special effects, and a magic wand are meant to make everyone look like an MTV star. Musical.ly fans ... The post What parents need to know about Musical.ly appeared first on Bitdefender. read more

Third-Party Breach Affects Credit Card Info of 47,000 Patients

Third-Party Breach Affects Credit Card Info of 47,000 Patients

by Luana PASCU, from HotForSecurity , on 14.12.2018

Weak security in third-party vendors strike again in the medical world. Baylor Scott and#38; White Medical Center – Frisco hospital in North Texas announced payment information, including partial credit card info, of some 47,000 patients or guarantors maybe have been compromised following a security incident with the third-party’s credit card processing system. The data breach [and#8230;] read more

Next >>