Security News > 2017 > May

Vulnerability affecting 1,000+ apps is exposing terabytes of data (Help Net Security)
2017-05-31 21:21

A newly discovered backend data exposure vulnerability, dubbed HospitalGown, highlights the connection between mobile apps and insecure backend databases. Appthority documented more than 1,000...

OMB Issues Agency Guidance on NIST Framework Adoption (InfoRiskToday)
2017-05-31 21:03

Memorandum Emphasizes IT Risk Management for Federal GovernmentWhite House Office of Management and Budget Director Mick Mulvaney has issued a memorandum to executive branch agencies on how they...

Medical Devices: Care Benefits vs. Cybersecurity Risks (InfoRiskToday)
2017-05-31 20:33

In an in-depth interview about a new study that identifies thousands of vulnerabilities in cardiac devices, security researcher Billy Rios calls on manufacturers to more carefully consider the...

New Standard Designed to Enhance EMV (InfoRiskToday)
2017-05-31 20:33

Payments Expert Roger Applewhite Says Chip Advances Are on the WayA new open payments standard aims to not only enhance card security but also improve and expand the functions available through...

Hack Department of Homeland Security Act Would Bring Bug Bounty Program to DHS (Threatpost)
2017-05-31 20:25

Senators introduced a bill last week to establish a bug bounty pilot program within the Department of Homeland Security.

Defense contractor stored intelligence data in Amazon cloud unprotected (ArsTechnica)
2017-05-31 20:00

Booz Allen Hamilton engineer posted geospatial intelligence to Amazon S3 bucket.

Google Rolls Out Business-Focused Security Enhancements for Gmail (Security Week)
2017-05-31 19:57

Google today announced a series of improvements to Gmail’s security aimed at making the service better at protecting business data. read more

Google Boosts Gmail’s Defenses for Businesses (Security Week)
2017-05-31 19:57

Google today announced a series of improvements to Gmail’s security aimed at making the service better at protecting business data. read more

Ohio Companies Unite to Share Threat Intelligence (Security Week)
2017-05-31 19:37

Cybersecurity is a form of asymmetric warfare. The attackers need to only succeed once; the defenders must succeed constantly. The attackers share weapons and methods continuously; the defenders...

Hackers blackmail patients of cosmetic surgery clinic (Help Net Security)
2017-05-31 19:19

Hackers has been trying to blackmail patients of a Lithuanian plastic surgery clinic, by threatening to publish their nude “before and after” photos online. The breach and the leak The photos were...