Security News

G/On has proved particularly effective where organizations need to scale remote access provision fast. The solution only allows access to authorised users and devices.

WALLIX announced a new initiative to support the healthcare sector. Following a year of high demand and accelerated digital transformation, WALLIX now provides enhanced data monitoring and secure remote access through an all-in-one-bundle.

Today, researchers have exposed common weaknesses lurking in the latest smart sex toys that can be exploited by attackers. In examples provided by the researchers, technologies like Bluetooth and inadequately secured remote APIs make these IoT personal devices vulnerable to attacks that go beyond just compromising user privacy.

The actor received the name LazyScripter and has been active since 2018, using phishing to target individuals seeking immigration to Canada for a job, airlines, and the International Air Transport Association. The researchers from Malwarebytes also found other examples where the attacker dropped other remote access trojans that are common to multiple hacking groups: LuminosityLink, RMS, Quasar, njRat, and Remcos.

Selecting a remote access solution for your business requires a few critical business decisions and use cases as part of the selection process. Enabling your employees to leverage a remote access solution is a go-to need for any business remote tool kit.

A shipment of laptops supplied to British schools by the Department for Education to help kids learn under lockdown came preloaded with malware, The Register can reveal. The affected laptops, distributed to schools under the UK government's Get Help With Technology scheme, which started last year, came bundled with Gamarue - an old remote-access worm from the 2010s.

New malicious NPM packages have been discovered that install the njRAT remote access trojan that allows hackers to gain control over a computer. NPM is a JavaScript package manager that allows developers and users to download packages and integrate them into their projects.

For close to two decades, organizations have allowed privileged employees to work remotely by offering remote access solutions as a part of the daily work environment. One common mistake that security teams make when designing and updating their security and remote-access policy is not fully understanding the current contours of their network - or accounting for employees' changing locations and access habits.

Several vulnerabilities found by researchers in the OpenEMR software can be exploited by remote hackers to obtain medical records and compromise healthcare infrastructure. Researchers at Swiss-based code quality and security solutions provider SonarSource discovered earlier this year that OpenEMR is affected by four types of vulnerabilities that impact servers using the Patient Portal component.

BlackBerry CEO John Chen and the research director from Gartner's endpoint and operations security group delivered speeches at the opening keynote. Ahead of the event, BlackBerry announced new security products and services including Cyber Suite and BlackBerry Persona Desktop.