FutureFive New Zealand - Consumer technology news & reviews from the future

Security vulnerabilities stories - Page 21

Cybersecurity40

Cohesity launches new vulnerability scan using backup data

Tue, 6th Aug 2019
#
cybersecurity
#
security vulnerabilities
#
cyber attacks
The application works by scanning backup copies on to identify any vulnerabilities across an organisation's IT environment.
Gettyimages 496835011

Vulnerabilities in cloud containers soar, report finds

Wed, 31st Jul 2019
#
cloud services
#
security vulnerabilities
#
containers
Cloud container vulnerabilities are on the rise, increasing by 46% compared to last year, according to Skybox Security's latest report.
Gettyimages 979008970

Huawei working to patch critical security vulnerabilities

Wed, 10th Jul 2019
#
security vulnerabilities
#
huawei
#
swascan
Huawei collaborates with Swascan to patch critical security flaws, underscoring that even tech giants like Adobe, Microsoft, and Lenovo are vulnerable.
Gettyimages 1040330634

UPDATED: Orvibo & Arlo smart home products patched to prevent attacks

Fri, 5th Jul 2019
#
vpns
#
surveillance
#
smart home
The security of smart home devices is once again under the spotlight this week, as two different device manufacturers come under fire for major vulnerabilities.
Gamer

Major vulnerability found Electronic Arts gaming client

Thu, 27th Jun 2019
#
gaming
#
digital entertainment
#
security vulnerabilities
Once exploited, the vulnerabilities would have led to player account takeover and identity theft, Check Point and CyberInt found.
Gettyimages 885332002

Slack users urged to update to prevent security vulnerability

Mon, 20th May 2019
#
security vulnerabilities
#
slack
#
tenable
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Gettyimages 1048265360

ZombieLoad: Another batch of flaws affect Intel chips

Thu, 16th May 2019
#
semiconductors
#
hyperscale
#
public cloud
Intel-powered computers are facing a new vulnerability called 'ZombieLoad' WHERE id = which allows attackers to leak information from protected memory.
Gettyimages 945200518

Forget endpoints—it's time to secure people instead

Thu, 16th May 2019
#
malware
#
wireless networks
#
zero trust security
Security paradigms need a shift; as mobile work ensues, companies must pivot from endpoint protection to securing the actual users.
Gettyimages 1139635207

PrinterLogic software vulnerable to remote attacks

Thu, 9th May 2019
#
printing
#
security vulnerabilities
#
printerlogic
Businesses using PrinterLogic Print Management Software are urged to deploy 'always on' VPNs amid new vulnerabilities that risk remote attacks on workstations.
Gettyimages 951013614

Security alert: More than 2 million IoT devices are now junk

Wed, 1st May 2019
#
smart home
#
f-secure
#
security vulnerabilities
Over two million IoT devices, including security cameras and baby monitors, have critical security flaws, warns researcher Paul Marrapese.
Gettyimages 535898187

Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach

Thu, 18th Apr 2019
#
data analytics
#
martech
#
planning
Faced with an overload of 'critical' vulnerabilities, Tenable turns to predictive solutions, launching a tool that targets the top 3% of likely exploits.
Malware3

Aura Infosec discovers major Mozilla Firefox vulnerability

Wed, 10th Apr 2019
#
cybersecurity
#
chrome
#
firefox
Alex Nikolova made the discovery while conducting a research project on the same-origin policy of various web browsers.
Vulnerability

Sonatype and HackerOne partner on open source vulnerability reporting

Mon, 25th Mar 2019
#
partner programmes
#
supply chain
#
open source
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process.
Malware6

Check Point names February's most disruptive malware

Tue, 12th Mar 2019
#
security vulnerabilities
#
coinhive
#
cryptomining
Coinhive tops Check Point's Global Threat Index for February 2019, marking its 15th month as the most disruptive malware despite its impending shutdown.
Thinkstockphotos 508373762

Logitech Harmony Hub vulnerabilities leave devs fuming

Tue, 5th Mar 2019
#
iot
#
logitech
#
security vulnerabilities
Logitech backtracks on decision to remove firmware version of Harmony Hub, after critical security flaws were revealed. Millions of users affected.
Github octocat detective

GitHub's Bug Bounty program gets bigger

Mon, 4th Mar 2019
#
martech
#
apm
#
software development
GitHub's Bug Bounty program is now five years old and to mark the occasion it has revamped the program's scope, rewards, and new legal rules.
Gettyimages 891422960

IBM X-Force Red & Qualys introduce automated patching

Tue, 19th Feb 2019
#
ibm
#
security vulnerabilities
#
patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Gettyimages 1127122070

Swiss Post asks public to hack its e-voting system

Mon, 18th Feb 2019
#
online voting
#
security vulnerabilities
#
bug bounty
Switzerland's postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Mi electric scooter 03

Security flaw in Xiaomi electric scooters could have deadly consequences

Wed, 13th Feb 2019
#
xiaomi
#
security vulnerabilities
#
electric scooter
Xiaomi's M365 electric scooters pose severe risks due to Bluetooth security flaws, potentially allowing attackers to control and endanger riders.
Malware5

Bug makes Android phones hackable via PNG image files

Fri, 8th Feb 2019
#
google
#
opinion
#
security vulnerabilities
This means any application handling PNG files that have been carefully crafted by an attacker can end up running the attacker's code.