TelcoNews Australia - Telecommunications news for ICT decision-makers

Security vulnerabilities stories - Page 17

Story image
Slack users urged to update to prevent security vulnerability
Mon, 20th May 2019
#
security vulnerabilities
#
slack
#
tenable network security
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Story image
ZombieLoad: Another batch of flaws affect Intel chips
Thu, 16th May 2019
#
hyperscale
#
public cloud
#
quantum computing
Intel-powered computers are facing a new vulnerability called 'ZombieLoad' WHERE id = which allows attackers to leak information from protected memory.
Story image
Forget endpoints—it’s time to secure people instead
Thu, 16th May 2019
#
malware
#
wireless networks
#
zero trust security
Security paradigms need a shift; as mobile work ensues, companies must pivot from endpoint protection to securing the actual users.
Story image
PrinterLogic software vulnerable to remote attacks
Thu, 9th May 2019
#
printing
#
security vulnerabilities
#
printerlogic
Businesses using PrinterLogic Print Management Software are urged to deploy 'always on' VPNs amid new vulnerabilities that risk remote attacks on workstations.
Story image
Security alert: More than 2 million IoT devices are now junk
Wed, 1st May 2019
#
smart home
#
f-secure
#
security vulnerabilities
Over two million IoT devices, including security cameras and baby monitors, have critical security flaws, warns researcher Paul Marrapese.
Story image
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Thu, 18th Apr 2019
#
data analytics
#
martech
#
planning
Faced with an overload of 'critical' vulnerabilities, Tenable turns to predictive solutions, launching a tool that targets the top 3% of likely exploits.
Story image
Aura Infosec discovers major Mozilla Firefox vulnerability
Wed, 10th Apr 2019
#
cybersecurity
#
chrome
#
firefox
Alex Nikolova made the discovery while conducting a research project on the same-origin policy of various web browsers.
Story image
Sonatype and HackerOne partner on open source vulnerability reporting
Mon, 25th Mar 2019
#
partner programmes
#
open source
#
security vulnerabilities
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process.
Story image
Check Point names February’s most disruptive malware
Tue, 12th Mar 2019
#
security vulnerabilities
#
coinhive
#
cryptomining
Coinhive tops Check Point’s Global Threat Index for February 2019, marking its 15th month as the most disruptive malware despite its impending shutdown.
Story image
Logitech Harmony Hub vulnerabilities leave devs fuming
Tue, 5th Mar 2019
#
iot
#
logitech
#
security vulnerabilities
Logitech backtracks on decision to remove firmware version of Harmony Hub, after critical security flaws were revealed. Millions of users affected.
Story image
GitHub's Bug Bounty program gets bigger
Mon, 4th Mar 2019
#
martech
#
apm
#
software development
GitHub’s Bug Bounty program is now five years old and to mark the occasion it has revamped the program’s scope, rewards, and new legal rules.
Story image
IBM X-Force Red & Qualys introduce automated patching
Tue, 19th Feb 2019
#
ibm
#
security vulnerabilities
#
patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Story image
Swiss Post asks public to hack its e-voting system
Mon, 18th Feb 2019
#
online voting
#
security vulnerabilities
#
bug bounty
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Story image
Security flaw in Xiaomi electric scooters could have deadly consequences
Wed, 13th Feb 2019
#
xiaomi
#
security vulnerabilities
#
electric scooter
Xiaomi's M365 electric scooters pose severe risks due to Bluetooth security flaws, potentially allowing attackers to control and endanger riders.
Story image
Bug makes Android phones hackable via PNG image files
Fri, 8th Feb 2019
#
smartphones
#
google
#
security vulnerabilities
This means any application handling PNG files that have been carefully crafted by an attacker can end up running the attacker’s code.
Story image
APRA Prudential Standard CPS 234: How to communicate with the board
Wed, 5th Dec 2018
#
fintech
#
security vulnerabilities
#
tenable network security
The Australian Prudential Regulation Authority’s standard, CPS 234, is aimed at minimising the threat of cyber attacks for APRA-regulated entities.
Story image
Cyber threat spotlight: Kiwis report more, lose less in Q2
Wed, 19th Sep 2018
#
firewalls
#
network infrastructure
#
network security
CERT NZ's latest report shows cyber threats and incident reports increased in Q2, yet monetary losses dropped by 24%, with most under NZD $500.
Story image
2018 proves to be a mixed bag of severe cyber threats, report finds
Mon, 17th Sep 2018
#
malware
#
firewalls
#
network infrastructure
2018 saw a surge in cyber threats with over 30 zero-day vulnerabilities and nearly 24,000 unique malware variants, Fortinet's report reveals.
Story image
Quick thinking remedies vulnerability in Schneider Electric ICS controller
Fri, 7th Sep 2018
#
datacentre infrastructure
#
power / energy
#
schneider electric
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
Story image
MikroTik routers in NZ may be at risk of cryptomining - Symantec
Mon, 20th Aug 2018
#
symantec
#
router
#
security vulnerabilities
New Zealand's MikroTik routers may be at risk of cryptomining attacks due to a global campaign targeting 157,000 devices, warns Symantec. Install patches.