Enterprise Security News
103 views | +0 today
Follow
 
Scooped by Gordon Kiser
onto Enterprise Security News
Scoop.it!

Cyber criminals are targeting smartphone supply chains, warn researchers - ComputerWeekly.com

Cyber criminals are targeting smartphone supply chains, warn researchers - ComputerWeekly.com | Enterprise Security News | Scoop.it
A new mobile trojan dubbed “DeathRing” is being pre-loaded onto smartphones somewhere in the supply chain, warn researchers
more...
No comment yet.
Your new post is loading...
Scooped by Gordon Kiser
Scoop.it!

6 Reasons Why IoT Security Is Terrible - IEEE Spectrum

6 Reasons Why IoT Security Is Terrible - IEEE Spectrum | Enterprise Security News | Scoop.it
The Internet of Things bears little resemblance to traditional IT systems—and that makes it harder to protect
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

The IoT's Perplexing Security Problems | Cybersecurity | TechNewsWorld

The IoT's Perplexing Security Problems | Cybersecurity | TechNewsWorld | Enterprise Security News | Scoop.it
Worldwide IoT spending will total nearly $773 billion this year, IDC has predicted. The IoT will sustain a compound annual growth rate of 14.4 percent, and spending will hit $1.1 trillion by 2021, according to the firm's forecast. Consumer IoT spending will total $62 billion this year, making it the fourth largest industry segment, after manufacturing, transportation and utilities.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Can you hack a drone?

Can you hack a drone? | Enterprise Security News | Scoop.it
Hack a drone? The short answer is yes. The long answer? Read more about hacking a drone at HowStuffWorks.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

How to Protect Your UAV from Data Hacking and Ensure Drone Security

How to Protect Your UAV from Data Hacking and Ensure Drone Security | Enterprise Security News | Scoop.it
The absence of adequate drone security and secure UAV systems can result in massive drone hacking and the public to have a shift of opinion on drones.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Hackers using drones to commit crimes - Denver7 TheDenverChannel.com

Hackers using drones to commit crimes - Denver7 TheDenverChannel.com | Enterprise Security News | Scoop.it
We see them everywhere. People are flying them all over the place. But there's a more serious, nefarious side to what should just be fun. Hackers are turning drones into devices that stea
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

5 computer security facts that surprise most people

5 computer security facts that surprise most people | Enterprise Security News | Scoop.it
As a 30-year road warrior, I’ve learned some security truths that seem wrong, but must be accepted if you really want to understand the threats you face.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Audit finds Department of Homeland Security's security is insecure • The Register

Audit finds Department of Homeland Security's security is insecure • The Register | Enterprise Security News | Scoop.it
The agency that keeps America safe runs un-patched Flash, and worse besides
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

In Light Of The Russian Attack, Utilities Seek New Defenses To Protect Critical Infrastructure

In Light Of The Russian Attack, Utilities Seek New Defenses To Protect Critical Infrastructure | Enterprise Security News | Scoop.it
With news that the Russians have penetrated America’s energy assets still hot, the calls for greater cyber security are growing ever-louder. What are the experts saying and what are the utilities doing to protect themselves?
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Facebook and Cambridge Analytica – What's Happened So Far

Facebook and Cambridge Analytica – What's Happened So Far | Enterprise Security News | Scoop.it
Facebook and Cambridge Analytica Privacy Scandal Explained – Here’s A Brief Recap of What Has Happened So Far
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Trickbot banking malware has new trick up its sleeve

Trickbot banking malware has new trick up its sleeve | Enterprise Security News | Scoop.it
Security reserachers have discovered that the Trickbot malware has been updated with you capabilities to evade detection and lock victim's computers.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Artificial intelligence could win the next Cold War

Artificial intelligence could win the next Cold War | Enterprise Security News | Scoop.it
Wide use of AI-powered cyberattacks may still be some time away, but countries are starting to recognize the important of AI cyber technology.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Unsecured At Any Speed: The Cyber Risks Of The Connected Car

Unsecured At Any Speed: The Cyber Risks Of The Connected Car | Enterprise Security News | Scoop.it
While no other device shows the promise and possibility of digital technology’s power to drive practical and extraordinary innovation, the connected car also reveals the risks and challenges other industries face in achieving digital proficiency.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Cybersecurity review of 2017 concludes with more industry incidents

The final part of our cybersecurity review of 2017 looks at several incidents that took place within the industry throughout the year.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Financial Services in the Ransomware Crosshairs: Why and What to Do | 2018-06-11 | Security Magazine

Financial Services in the Ransomware Crosshairs: Why and What to Do | 2018-06-11 | Security Magazine | Enterprise Security News | Scoop.it
Cybercriminals are leveraging ransomware threats to extort big money from organizations of all sizes in every industry, but financial services organizations are one of today’s primary targets. It is non-negotiable for financial services companies to maintain the privacy of theirs customers and the security of their confidential data. If a bank or credit union is hit with a ransomware attack, significant backlash is undoubtedly going to ensue – especially if customer data is held ransom for a significant amount of time. Why financial services organizations? . . .
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

UTM Dreams Are Made of These - The 3 Major Problems of UTM

more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

What’s needed to ensure safety and security in UAV software

What’s needed to ensure safety and security in UAV software | Enterprise Security News | Scoop.it
UAVs are not like the remote control stunt plane you unwrapped on your 10th birthday. In their different guises they can be found in civil airspace or flying as integral players in military missions. That makes unmanned systems’ safety and security very serious considerations. Accordingly, ISO 14508 and DO-178 could prove helpful in perpetuating safety and security for unmanned systems. Software tools that automate the processes required by these certification standards are easing the burden.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Johns Hopkins grad students work to prevent hacking attacks on drones | Hub

Johns Hopkins grad students work to prevent hacking attacks on drones | Hub | Enterprise Security News | Scoop.it
Three cybersecurity grad students work to prevent hacking attacks on drones
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

You Can Hijack Nearly Any Drone Mid-flight Using This Tiny Gadget

You Can Hijack Nearly Any Drone Mid-flight Using This Tiny Gadget | Enterprise Security News | Scoop.it
Hackers can use Icarus box to hack nearly any drone mid-flight, rather than shooting it down.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Cognitive Hack: Trust, Deception And Blind Spots

Cognitive Hack: Trust, Deception And Blind Spots | Enterprise Security News | Scoop.it
Cognitive hacks are asymmetric in nature – meaning that the downside of these attacks can significantly outweigh the benefits of risk-taking if not addressed in a timely manner. Because of the asymmetric nature of a cognitive hack, attackers seek the easiest route to gai
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Why You Should Never Pay A Ransomware Ransom

Why You Should Never Pay A Ransomware Ransom | Enterprise Security News | Scoop.it
This just in: cybercriminals are not, generally speaking, a trustworthy bunch.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Buyers Beware of Tampered Gift Cards — Krebs on Security

Buyers Beware of Tampered Gift Cards — Krebs on Security | Enterprise Security News | Scoop.it
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Leader of Hacking Group Who Stole $1 Billion From Banks Arrested In Spain

Leader of Hacking Group Who Stole $1 Billion From Banks Arrested In Spain | Enterprise Security News | Scoop.it
Spanish Police has arrested the leader of Russian hacking group behind the Carbanak and Cobalt malware attacks, who stole over a billion euros from banks worldwide.
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Business Email Compromise Phishing Attacks Will Exceed $9 Billion This Year

Business Email Compromise Phishing Attacks Will Exceed $9 Billion This Year | Enterprise Security News | Scoop.it
Business Email Compromise Phishing Attacks Will Exceed $9 Billion This Year
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

10 Hottest Cybersecurity and Privacy Technologies

10 Hottest Cybersecurity and Privacy Technologies | Enterprise Security News | Scoop.it
To help cybersecurity and privacy professionals prepare for a future in which their organizations will increasingly be held accountable for the data on consumers they collect, analyze and sell, Forrester Research investigated the current state of the 20 most important data protection tools. Read more on Forbes.com
more...
No comment yet.
Scooped by Gordon Kiser
Scoop.it!

Cybersecurity forecast 2018: threats and trends for the year ahead

Cybersecurity forecast 2018: threats and trends for the year ahead | Enterprise Security News | Scoop.it
As 2017 draws to a close, Digital Health News spoke to cybersecurity experts about their predictions for the digital landscape in 2018.
more...
No comment yet.