IT Brief Asia - Technology news for CIOs & IT decision-makers

Security vulnerabilities stories - Page 21

Malware6

Check Point names February's most disruptive malware

Tue, 12th Mar 2019
#
security vulnerabilities
#
coinhive
#
cryptomining
Coinhive tops Check Point's Global Threat Index for February 2019, marking its 15th month as the most disruptive malware despite its impending shutdown.
Thinkstockphotos 508373762

Logitech Harmony Hub vulnerabilities leave devs fuming

Tue, 5th Mar 2019
#
iot
#
logitech
#
security vulnerabilities
Logitech backtracks on decision to remove firmware version of Harmony Hub, after critical security flaws were revealed. Millions of users affected.
Github octocat detective

GitHub's Bug Bounty program gets bigger

Mon, 4th Mar 2019
#
martech
#
apm
#
software development
GitHub's Bug Bounty program is now five years old and to mark the occasion it has revamped the program's scope, rewards, and new legal rules.
Gettyimages 891422960

IBM X-Force Red & Qualys introduce automated patching

Tue, 19th Feb 2019
#
ibm
#
security vulnerabilities
#
patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Gettyimages 1127122070

Swiss Post asks public to hack its e-voting system

Mon, 18th Feb 2019
#
online voting
#
security vulnerabilities
#
bug bounty
Switzerland's postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Mi electric scooter 03

Security flaw in Xiaomi electric scooters could have deadly consequences

Wed, 13th Feb 2019
#
xiaomi
#
security vulnerabilities
#
electric scooter
Xiaomi's M365 electric scooters pose severe risks due to Bluetooth security flaws, potentially allowing attackers to control and endanger riders.
Malware5

Bug makes Android phones hackable via PNG image files

Fri, 8th Feb 2019
#
google
#
opinion
#
security vulnerabilities
This means any application handling PNG files that have been carefully crafted by an attacker can end up running the attacker's code.
Img hog1vzd5owi3vpiehyp7urqi

Quick thinking remedies vulnerability in Schneider Electric ICS controller

Fri, 7th Sep 2018
#
datacentre infrastructure
#
power / energy
#
schneider electric
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
Intel core s series chip

Flaw discovered in Intel chips, allows attackers to steal cloud data

Thu, 16th Aug 2018
#
semiconductors
#
intel
#
cpu
A newly discovered flaw in Intel chips, dubbed Foreshadow, can lead attackers to access sensitive data from personal computers and cloud services.
Screen shot 2018 08 15 at 11

Exclusive interview: Major MFA vulnerability discovered in Microsoft's ADFS

Wed, 15th Aug 2018
#
mfa
#
iam
#
cybersecurity
A critical flaw in Microsoft's ADFS allows bypassing MFA, posing a severe risk, warns Okta's REX team. Urgent patching is recommended for users.
Thinkstockphotos 856672504 8rwqcmm

At-work collaboration apps most vulnerable to cyber attacks

Fri, 27th Jul 2018
#
cloud services
#
security vulnerabilities
#
cloud communications
According to a survey of 500 decision makers across several industries, 80% believe that cloud collaboration tools are vulnerable to cyber attacks.
Thinkstockphotos 826175066

Google Chrome launches new feature to block Spectre attacks

Tue, 17th Jul 2018
#
google
#
chrome
#
spectre
Google Chrome's latest update brings 'site isolation' to prevent Spectre attacks, offering advanced protection by isolating each tab's process.
Thinkstockphotos 547244256

GitHub rolls out security alerts feature for Python

Mon, 16th Jul 2018
#
martech
#
apm
#
software development
GitHub adds security alerts for Python, allowing users to be notified when their code depends on packages with known vulnerabilities.
Secure banking

Use of banking trojans up 50%, cryptomining still dominant malware – report

Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point's latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
P90305602 highres

BMW awards Chinese security team's work in exposing connected vehicle vulnerabilities

Thu, 24th May 2018
#
cartech
#
bmw
#
tencent
When Chinese security researchers found vulnerabilities in BMW's connected vehicles, BMW didn't just fix the vulnerabilities, it awarded the team.
Thinkstockphotos 830636952

Singapore IMDA launches GoSecure cybersecurity programme for Singapore ICT firms

Wed, 23rd May 2018
#
devops
#
apm
#
cybersecurity
Singapore's IMDA launches the GoSecure programme, collaborating with SIT to enhance the cybersecurity of 200 ICT firms from July 2018 to July 2020.
Thinkstockphotos 952856414

Report: Open source software plagued with vulnerabilities

Mon, 21st May 2018
#
open source
#
healthtech
#
security vulnerabilities
78% of 1100 examined codebases contained at least one open source vulnerability, with an average of 64 vulnerabilities per codebase.
Thinkstockphotos 493694506

OWASP vulnerabilities plague mobile apps: Data leakage a major concern

Wed, 9th May 2018
#
mobile apps
#
security vulnerabilities
#
pradeo
Across two million applications analysed by Pradeo's security engine, almost one third of applications contained an OWASP vulnerability.
Thinkstockphotos 927414626

Singapore organizations caught in 'patching paradox'

Tue, 8th May 2018
#
breach prevention
#
cybersecurity
#
data breach
Singapore organizations say they don't have the resources to keep up with the volume of patches required to remediate software flaws.
Bedroom door entrance 271639

Electronic lock vulnerabilities can lead attackers directly to your hotel room

Mon, 30th Apr 2018
#
physical security
#
cybersecurity
#
f-secure
Next time you stay at a hotel as part of a business or personal trip, you may want to ask if the hotel's locking systems are up-to-date.