Industrial manufacturer Siemens is encouraging users running devices that use its Ruggedcom protocol to apply firmware updates this week. The updates resolve a serious and remotely exploitable vulnerability that could let an attacker carry out administrative actions.
Hackers are looking to crack ATM networks without needing physical access to the devices. And many cash machines are running antiquated versions of Windows like Windows XP.
Too many tools has been a common problem for Microsoft for years. I hope that they get all these tools corralled into one service offering.
Microsoft is using this week’s Ignite conference to try to help clarify its collaboration-tool strategy. Here’s how SharePoint, Teams and Yammer figure in the mix.
How many more of these IoT devices that use DRM technology to validate the use of proprietary refills do we have to endure?
The Internet of Things (IoT) is awesome. I love my smart devices when they make my life easier.
That’s supposed to be the point of connected devices, which is to add sensor capability, remote operation, and data gathering that benefits the end-user.
Yes, that data is valuable to the device manufacturer, too, which runs cloud services in order to make that product work. And it’s a huge liability should that data make it out into the wild. But that’s the cost of IoT.
I have a lot of connected devices in my home. Thermostats, lighting, fans, electrical switches, garage door openers, and even my swimming pool/spa heater and pump. And, of course, my smart speakers, such as my Amazon Echo devices and Sonos devices.
Mobile devices and facial recognition software have made the list this year.
Human error is often a factor when cybersecurity barriers fall, but according to hackers, password protection, facial recognition, and access controls are blind spots in corporate network security.
According to Bitglass’ Data Games: Security Blind Spots report, both black and white self-labeled hackers said that these security measures are the least effective and it may not even be necessary to brute-force for credentials or snoop and steal them with Man-in-the-Middle (MiTM) attacks.
Instead, human error and ignorance are always exploitable weak links and therefore phishing campaigns are the best data exfiltration strategy against the enterprise.