vulnerability

Home/Tag: vulnerability

IoT can help manufacturing, but does it make you less secure?

When companies began to embrace the idea and the tech behind the Internet of Things (IoT), one area that stood to benefit the most was, and is, the world of manufacturing. Anyplace that relies on efficient operations to keep things flowing, and does so using a litany of systems, lends itself well to the burgeoning world of IoT. Imagine if all of your numerous systems are becoming much more easy to network and thus control online-it would be a godsend [...]

Serious iOS messaging bug can crash your iPhone

Everyone who uses an Apple device should be on the lookout for a new threat that can crash/reboot your device.  Users of Apple’s desktop and mobile operating systems are experiencing crashing computers, phones, and tablets across the internet.  This is caused by a bug in Apple's rendering engine of Arabic text when a message gets shortened. The text that will cause this can be seen in the image below: By the time you’ve received the malicious text, it’s probably too late. [...]

New threat is using job websites to spread malware

A new threat has been identified and is being carried out by using phishing and social engineering techniques to sneak malware into several businesses.  Sites like Careerbuilder have reported malicious documents in Microsoft Word format titled “resume.doc” or “cv.doc.” So how does this new attack work? When a resume is submitted, sites like CareerBuilder automatically send a notification email to the company that posted the ad, along with the resume attached to it. When the end-user opens the email and [...]

A Sign of What’s to Come – Reporting Cyber Vulnerabilities

This appears to be a sign of what’s to come, both for how companies view and report cyber vulnerabilities. The first step for every entity is to get an information security risk assessment (which of course we would encourage) but the reality is that whether you act or not there is new legislation on the horizon, new rules for third party vendors and a “New Normal” for the way business is done. Here is an excellent example, courtesy of the SEC.  Read [...]