Security News > 2020

Wind River and T-Systems deliver 5G cloud network management
2020-02-06 01:30

Wind River, a leader in delivering software for the intelligent edge, announced that T-Systems is using Wind River Cloud Platform edge cloud infrastructure software for its EdgAIR secure and high-performance edge computing platform. Its EdgAIR platform performs as a private enterprise edge cloud and can be connected to a campus network by supporting various network and protocol standards.

Samsung introduces high-performing DRAM, helps advance supercomputers, AI-driven data analytics
2020-02-06 01:00

Samsung announced the market launch of Flashbolt, its third-generation High Bandwidth Memory 2E. The new 16-gigabyte HBM2E is uniquely suited to maximize high performance computing systems and help system manufacturers to advance their supercomputers, AI-driven data analytics and state-of-the-art graphics systems in a timely manner. "With the introduction of the highest performing DRAM available today, we are taking a critical step to enhance our role as the leading innovator in the fast-growing premium memory market," said Cheol Choi, executive vice president of Memory Sales & Marketing at Samsung Electronics.

When Your Used Car is a Little Too ‘Mobile’
2020-02-06 00:44

Mathew Marulla began leasing a Ford Focus electric vehicle in 2013, but turned the car back in to Ford at the end of his lease in 2016. Asked to comment on Marulla's experience, a spokesperson for Ford said all Ford dealerships are supposed to perform a "Master reset" as part of their used car checklist prior to the resale of a vehicle.

NTT DATA Services enters strategic collaboration agreement with AWS
2020-02-06 00:30

NTT DATA Services announced it has entered into a three-year, strategic collaboration agreement with Amazon Web Services, to deliver new products, services and solutions designed to accelerate cloud transformations. Through this collaboration, NTT DATA can provide clients with advisory and development services, as well as implementation, migration, and management of solutions on AWS. NTT DATA, which has more than 900 AWS certifications, also recently acquired Flux7, a Premier Consulting Partner in the AWS Partner Network, to enhance the value the company can deliver in AWS, DevOps and Agile development capabilities.

The Rise of the Open Bug Bounty Project
2020-02-06 00:05

Today, Open Bug Bounty already hosts 680 bug bounties, offering monetary or non-monetary remuneration for security researchers from over 50 countries. Global companies such as Telekom Austria, Acronis, or United Domains run their bug bounties at Open Bug Bounty.

Aon acquires Cytelligence, a firm with deep expertise in cyber incident response
2020-02-06 00:00

Aon announced the acquisition of Cytelligence, a Canadian-based cyber security firm that provides incident response advisory, digital forensic expertise, security consulting services and cyber security training for employees to help organizations respond to cyber security threats and strengthen their security position. The acquisition will help Aon expand its current coverages within the cyber market at a time when cyber claims are almost doubling year-over-year.

Terrifying bug in WhatsApp allows hackers to steal files. So get patching all nine of you using it on the desktop
2020-02-05 23:56

A vulnerability in WhatsApp could be exploited to remotely access a victim's files on their computer - if they use the desktop client paired with the iPhone app. The security bug was fixed in January by Facebook in WhatsApp Desktop version 0.3.9309 and later.

Automox raises $30 million to automate endpoint hardening
2020-02-05 23:30

"The security industry has done a great job of providing tools that are effective at identifying adversaries once they are inside your infrastructure," said Jay Prassl, Founder and CEO, Automox. Automox's modern cloud-native platform enables security and IT teams to automate the fundamentals of endpoint hardening, resulting in a reduction of their corporate attack surface by up to 80%. This approach not only makes corporate infrastructure more resilient to attack, but it also dramatically reduces alert fatigue common in downstream endpoint detection and response tools.

Sketchy behavior? Wacom tablet drivers phone home with names, times of every app opened on your computer
2020-02-05 21:48

FYI: Wacom's official tablet drivers leak to the manufacturer the names of every application opened, and when, on the computers they are connected to. If you want to disable this snooping, open your Wacom Desktop Center, find the slightly hidden More link, click on it, go to the privacy settings, and opt out of "Wacom's Experience Program." Note that you may have to opt out again after updating your driver installation: this data collection is enabled by default.

CDPwn vulnerabilities open millions of Cisco enterprise devices to attack
2020-02-05 21:31

If you have Cisco equipment in your enterprise network - and chances are good that you have - you should check immediately which feature the newly revealed CDPwn vulnerabilities in Cisco' proprietary device discovery protocol and implement patches as soon as possible. "Different models of devices that run Cisco FXOS Software, Cisco IP Camera Firmware, Cisco IP Phone Firmware, Cisco NX-OS Software, Cisco IOS-XR, and Cisco UCS Fabric Interconnects are affected by one or more of these vulnerabilities," a Cisco spokesman told Help Net Security.