Technology in Bus...
Follow
Find tag "cybersecurity"
175.8K views | +85 today
Technology in Business Today
Technology in Business Today
Latest News and Innovations in Technology
Curated by TechinBiz
Your new post is loading...
Your new post is loading...
Scooped by TechinBiz
Scoop.it!

Hackers Lurking in Vents and Soda Machines

Hackers Lurking in Vents and Soda Machines | Technology in Business Today | Scoop.it
Companies are finding that their greatest cybersecurity threats can hide in third-party systems, like networked air-conditioning equipment.
TechinBiz's insight:

Unable to breach the computer network at a big oil company, hackers infected with malware the online menu of a Chinese restaurant that was popular with employees. When the workers browsed the menu, they inadvertently downloaded code that gave the attackers a foothold in the business’s vast computer network.

more...
Scooped by TechinBiz
Scoop.it!

Experts call cyber security policy too vague

Experts call cyber security policy too vague | Technology in Business Today | Scoop.it
In order to better arm itself in the wake of rising threat of cyber crime, the government on Tuesday announced the National Cyber Security Policy 2013 (The government has announced the National Cyber Security Policy 2013 in the wake of rising #cybercrime...
more...
No comment yet.
Rescooped by TechinBiz from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Researchers warn of “huge” Android security flaw

Researchers warn of “huge” Android security flaw | Technology in Business Today | Scoop.it
Security researchers have discovered a vulnerability that could allow attackers to take full control of most Android smartphones

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.

 


Via Gust MEES
more...
Gust MEES's curator insight, July 4, 2013 6:45 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:48 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Zhao KQiang's curator insight, March 27, 2014 6:52 AM

there is one example of smart phone security. focus on the mobile system Android