Security News > 2018 > January

2018: The year of the NIS Directive
2018-01-03 14:50

In 2017 the GDPR buzz reached peak intensity, even in the cybersecurity community. It practically drowned out any mentions of another important upcoming EU law: The Network and Information...

Despite cybersecurity concerns, many consumers don’t protect themselves
2018-01-03 13:30

Despite awareness of the need for cybersecurity, many consumers are not taking proactive steps to keep their personal information protected from identity theft. With the increased volume of...

VMware Patches Critical Flaws in vSphere Data Protection
2018-01-03 13:12

VMware has patched three critical vulnerabilities in vSphere Data Protection (VDP), including arbitrary file upload, authentication bypass and path traversal issues. read more

Forever 21 Suffered 7-Month POS Malware Attack
2018-01-03 13:03

Retailer Confirms US Payment Card Data Breach; International Probe ContinuesApparel retailer Forever 21 says point-of-sale systems in some stores were infected by malware for up to seven months,...

Smart cars need smart and secure IT/OT Infrastructures
2018-01-03 12:45

IT can fail. It often does. We restart IT, and life goes on. Hackers can also compromise these same IT systems creating disruptions and causing theft of credentials. All manners of serious...

Tamper-Detection App for Android
2018-01-03 12:17

Edward Snowden and Nathan Freitas have created an Android app that detects when it's being tampered with. The basic idea is to put the app on a second phone and put the app on or near something...

Mitigations Prepared for Critical Flaw in Intel CPUs
2018-01-03 10:31

Researchers have apparently discovered a serious vulnerability affecting all Intel CPUs. Software-level mitigations have already been developed, but they could cause significant performance...

MacOS LPE Exploit Gives Attackers Root Access
2018-01-02 22:12

A researcher with the Twitter handle ‘Siguza’ published details of a macOS local privilege escalation vulnerability dating back to 2002 that could give an attacker root access to systems.

How to keep your browser and devices safe from cryptojackers
2018-01-02 21:36

Cryptojacking makes surfing the web similar to walking through a minefield: you never know when you might land on a booby-trapped site. Stealthy cryptocurrency mining scripts have found their way...

Many GPS Tracking Services Expose User Location, Other Data
2018-01-02 21:10

Researchers discovered that many online services designed for managing location tracking devices are affected by vulnerabilities that expose potentially sensitive information. Fitness, child, pet...