FutureFive New Zealand - Consumer technology news & reviews from the future

Common Vulnerabilities and Exposures (CVE) stories - Page 19

Screen shot 2018 10 03 at 3

Huge vulnerabilities in software supply chain being exploited

Thu, 4th Oct 2018
#
devops
#
supply chain
#
apm
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.
Thinkstockphotos 691333526

Cyber threat spotlight: Kiwis report more, lose less in Q2

Wed, 19th Sep 2018
#
firewalls
#
network infrastructure
#
network security
CERT NZ's latest report shows cyber threats and incident reports increased in Q2, yet monetary losses dropped by 24%, with most under NZD $500.
Thinkstockphotos 976370294

2018 proves to be a mixed bag of severe cyber threats, report finds

Mon, 17th Sep 2018
#
malware
#
firewalls
#
network infrastructure
2018 saw a surge in cyber threats with over 30 zero-day vulnerabilities and nearly 24,000 unique malware variants, Fortinet's report reveals.
Img hog1vzd5owi3vpiehyp7urqi

Quick thinking remedies vulnerability in Schneider Electric ICS controller

Fri, 7th Sep 2018
#
datacentre infrastructure
#
power / energy
#
schneider electric
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
Router hack

MikroTik routers in NZ may be at risk of cryptomining - Symantec

Mon, 20th Aug 2018
#
symantec
#
router
#
security vulnerabilities
New Zealand's MikroTik routers may be at risk of cryptomining attacks due to a global campaign targeting 157,000 devices, warns Symantec. Install patches.
Cybersecurity breach2

Over 2,300 data breaches disclosed so far in 2018 - report

Mon, 20th Aug 2018
#
phishing
#
email security
#
breach prevention
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.
Screen shot 2018 08 15 at 11

Exclusive interview: Major MFA vulnerability discovered in Microsoft's ADFS

Wed, 15th Aug 2018
#
mfa
#
iam
#
cybersecurity
A critical flaw in Microsoft's ADFS allows bypassing MFA, posing a severe risk, warns Okta's REX team. Urgent patching is recommended for users.
Thinkstockphotos 597939666

Mobile apps are now a crucial part of event promotion

Tue, 14th Aug 2018
#
digital transformation
#
mobile apps
#
cvent australia
If you're thinking of running an event, a mobile app is not just a nice feature but an essential part of event promotion.
Gettyimages 1327245423

A deep dive into the present and future of retail off- and online

Wed, 1st Aug 2018
#
martech
#
commerce systems
#
omnichannel
Russell McVeagh Special Counsel Liz Blythe examines the opportunities and risks associated with the eye-wateringly quick pace of change in the sector.
Open source

Exclusive: Why open source is critical to software development

Mon, 23rd Jul 2018
#
dr
#
cloud security
#
open source
Pivotal APJ head Lawrence Crowther discusses the importance of open source and cloud in modern software development.
Thinkstockphotos 547244256

GitHub rolls out security alerts feature for Python

Mon, 16th Jul 2018
#
martech
#
apm
#
software development
GitHub adds security alerts for Python, allowing users to be notified when their code depends on packages with known vulnerabilities.
Secure banking

Use of banking trojans up 50%, cryptomining still dominant malware – report

Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point's latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
4 securty strategies

The top four security strategies and why they're so effective

Mon, 21st May 2018
#
malware
#
ransomware
#
cybersecurity
The top four cybersecurity strategies, including application whitelisting and patching, are proving highly effective against 85% of attacks like ransomware.
Thinkstockphotos 850906706

Noel Leeming hit by nine charges of breaching consumer rights

Mon, 30th Apr 2018
#
commerce commission
#
noel leeming
#
the warehouse group
The consumer retail, owned by The Warehouse Group, will defend the nine charges, each laid by different customers, in court at the end of May.
Thinkstockphotos 882835538

No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list

Mon, 16th Apr 2018
#
crypto
#
blockchain
#
cryptomining
Cryptomining malware is shifting its focus from browsers to endpoints, with XMRig rising in popularity among cybercriminals.
Thinkstockphotos 846251202

Attackers exploit macro-less Office documents to create havoc

Tue, 3rd Apr 2018
#
malware
#
firewalls
#
network infrastructure
Cybercriminals use Microsoft Office documents to conduct 'macro-less' attacks that dodge organisations' defences and inject malware.
Awardss

Christchurch social enterprise convention nabs prize at global event awards

Mon, 26th Mar 2018
#
social enterprise
#
akina
#
social enterprise world forum
Christchurch's Social Enterprise World Forum 2017 secures a strong second for Best Conference at Eventex Award, showcasing positive global change.
Screen shot 2018 03 12 at 10

New research finds China tampering with public vulnerability data

Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
Screen shot 2018 03 06 at 12

REPORT: Ransomware decreasing in quantity but increasing in potency

Wed, 7th Mar 2018
#
malware
#
ransomware
#
supply chain
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
Thinkstockphotos 879913100

State-sponsored North Korean cyberespionage group continues to weaponize tactics

Wed, 21st Feb 2018
#
breach prevention
#
healthtech
#
fireeye
The North Korean threat group known to some as Reaper (APT37) is eyeing bigger targets with more sophisticated tactics.