Tuesday, July 24, 2018

Unsecured server exposes 157 GB of highly sensitive data from Tesla, Toyota and more

Half a billion smart devices vulnerable to decade-old DNS rebinding attacks

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jul 24, 2018
Featured Image

Unsecured server exposes 157 GB of highly sensitive data from Tesla, Toyota and more

A publicly accessible server belonging to Level One Robotics and Controls exposed 157 GB of highly sensitive data from hundreds of companies, including Tesla, Toyota and Ford. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Half a billion smart devices vulnerable to decade-old DNS rebinding attacks
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
Can cyber insurance cover acts of cyber terrorism?
6 essential elements of edge computing security
The router of all evil
Review: Predictively locking down security with Balbix

White Paper: PTC

4 Reasons Remote Monitoring is Your Best Move to Better Service

Download this free e-book to discover how companies are realizing proven returns with IoT-enabled remote monitoring, which can be quickly implemented and monetized. Read More

Thumbnail Image

Half a billion smart devices vulnerable to decade-old DNS rebinding attacks

Researchers warned that 496 million smart devices used by enterprises and in homes are vulnerable to DNS rebinding attacks. Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image
INSIDER

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's Government. (Did you spot the catch?) Read More

Thumbnail Image
INSIDER

6 essential elements of edge computing security

Edge computing is fast becoming a new cybersecurity "front line" as users overlook security in their rush to get data and services deployed. Do you have a plan for patrolling the edge? Read More

Thumbnail Image

The router of all evil

Discusses research on threats to home routers, which recently became the target of a Russian malware campaign using the "VPNfilter" malware. Read More

Thumbnail Image
INSIDER

Review: Predictively locking down security with Balbix

Balbix may technically be a vulnerability manager, but it does it so much better and also so much more that it breaks the bounds of its category. Read More

White Paper: PTC

Remote Monitoring Provides Real-Time Information for Improved Servicing

In the "Quick Start Guide: Monitoring Equipment with IoT" eBook, Tech-Clarity, an independent manufacturing technology research firm, shows how manufacturers can use remote monitoring to quickly identify failures and efficiently repair equipment. Tech-Clarity provides actionable steps that manufacturers can take to connect remote equipment, gather the right data and put that data to use. Read More

Editor's Picks

1. Identity eats security: How identity management is driving security
2. What it takes to build a zero trust network
3. 7 threat modeling mistakes you're probably making
4. 6 essential elements of edge computing security
5. Hardware, software options emerge for runtime encryption
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 3:01 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive