Robots are becoming ever-smarter and more capable, but researchers and engineers driving robotics and AI aren’t thinking about security.
from Naked Security http://bit.ly/1RQcp7k
Crooks spirited the money away to China with the "CEO email" scam. A little luck and an exec on the ground in China helped them get it back.
from Naked Security http://bit.ly/1SCLNUl
The Department of Defense announced that registration for its Hack the Pentagon bug bounty trial program is open, and that the program will be run on the HackerOne platform.
from Threatpost | The first stop for security news http://bit.ly/1UXhon2
The federal government has invoked the All Writs Act at least 63 times since 2008 in attempts force Apple and Google to unlock phones.
from Threatpost | The first stop for security news http://bit.ly/1X0ixbs
Nothing breeds success like success.
from Naked Security http://bit.ly/1pNR8hK
Check Point has discovered a weakness that allows hackers to use phishing to carry out man-in-the-middle attacks between iOS devices and mobile device management tools and allow an attacker to push malicious apps to devices.
from Threatpost | The first stop for security news http://bit.ly/1pNyxm3
There’s hardly a day anymore that we don’t hear about a hospital being hit with ransomware. But while most have been infected via phishing emails carrying or linking to the malware, the latest incidents show a new modus operandi when it comes to malware delivery: compromising servers by leveraging vulnerabilities and spreading the ransomware to Windows machines from there. Latest (public) victim An example of this attack is that which hit US-based not-for-profit healthcare organization … More →
from Help Net Security http://bit.ly/22RGJUu