NAPLES, Fla., Oct. 24, 2018 -- New Net Technologies (NNT), leader in security through system integrity, today announced significant advances to its flagship change control solution with the release of Change Tracker Gen7 R2. Gen7 R2 solves IT Security and Service Management problems that plague every organization.
Today the UK government released a new Code of Practice (CoP) intended to drive security-by-design in the manufacture of IoT products. The new CoP is designed to improve baseline security in the sector and ensure small devices that process personal data are aligned with the GDPR. Regulations for improving the security of consumer-grade IoT products are also in the works.
The latest research from Blueliv has found that the number of compromised credentials detected in North American botnets grew 141% from the last quarter. The spike between the March to May and June to August quarters came alongside declines in other regions analyzed. Russia and Europe saw a 22% decrease and Asia saw a 36% decrease.
Google is shutting down its Google+ social network following the disclosure of a software glitch within Google+ that resulted in the exposure of personal-profile data belonging to hundreds of thousands of Google+ users. The glitch was live for close to three years, but Google elected to not make the breach public out of fear of regulation.
The FBI & DHS issued a joint statement alerting businesses and consumers that cybercriminals are increasingly exploiting the Remote Desktop Protocol (RDP) administration tool. The notice states that using RDP as an attack vector has been on the rise since 2016, with attackers using open RDP ports to hijack machines or intercepting RDP sessions and infecting the system being remotely accessed with different types of malware.
European regulators are awaiting details from Facebook regarding last week’s data breach involving an estimated 50 million Facebook users. Last week, Facebook notified the public that three vulnerabilities found within its video uploader tool allowed hackers to exploit access tokens belonging to 50 million user accounts.