Watch Hackers Hijack Three Robots for Spying and Sabotage

The entire corpus of science fiction has trained humanity to fear the day when helpful household and industrial robots turn against it, in a Skynet-style uprising. But a much more near-term threat lurks in the age of automation: not that anthropomorphic gadgets will develop minds of their own, but that a very human hacker will […] more…

Watch Hackers Hijack Three Robots for Spying and Sabotage

The entire corpus of science fiction has trained humanity to fear the day when helpful household and industrial robots turn against it, in a Skynet-style uprising. But a much more near-term threat lurks in the age of automation: not that anthropomorphic gadgets will develop minds of their own, but that a very human hacker will […] more…

Watch Hackers Hijack Three Robots for Spying and Sabotage

The entire corpus of science fiction has trained humanity to fear the day when helpful household and industrial robots turn against it, in a Skynet-style uprising. But a much more near-term threat lurks in the age of automation: not that anthropomorphic gadgets will develop minds of their own, but that a very human hacker will […] more…

Watch Hackers Hijack Three Robots for Spying and Sabotage

The entire corpus of science fiction has trained humanity to fear the day when helpful household and industrial robots turn against it, in a Skynet-style uprising. But a much more near-term threat lurks in the age of automation: not that anthropomorphic gadgets will develop minds of their own, but that a very human hacker will […] more…

Researchers Demo Remote Hacking of Industrial Cobots

Researchers at security firm IOActive have shown how a remote attacker can hack an industrial collaborative robot, or cobot, and modify its safety settings, which could result in physical harm to nearby human operators. read more more…

Resolved: PASS problem

All affected services have been restored as of 1:52pm. more…

Time to Close vs. Root Cause – Are we measuring the wrong thing (again)?

“Human beings adjust behavior based on the metrics they’re held against. Anything you measure will impel a person to optimize his score on that metric. What you measure is what you’ll get. Period.” – Dan Ariely, Duke University behavioral economist in Harvard Business Review   When the Verizon Data Breach Investigation Report started reporting “time to” metrics […] more…

News in brief: AWS buckets leak more data; NHS hit by hacker; ‘Mr Smith’ may publish GoT episodes

Your daily round-up of some of the other stories in the news more…

DDoS Threat Increases While Mirai Becomes ‘Pay-for-Play’

The DDoS threat is increasing again. Pbot can generate 75 Gbps from just 400 nodes and Mirai has been commoditized. However, despite the growing number of attacks, the overall trend seems to be for more frequent, smaller attacks. These are the primary takeaways from a new Q2 study into internet traffic. read more more…

Evasion Techniques in Phishing Attacks

We all know that we shouldn’t click on links from sketchy looking emails. But what if the website you’re viewing takes you to a spoofed page at the Apple ID store and asks for your login information to proceed? This tactic is called phishing, and attacks are exponentially on the rise. Used by hackers to […] more…

US appeals court curbs police power to seize cellphones

A ruling from an appeals court judge has raised questions about privacy, device security, and how law enforcement conducts investigations more…

PASS problem

Penn State IT staff are working on a problem with PASS that started around 9:02 am this morning. Some users may have trouble reaching files in PASS. Web servers such as www.personal.psu.edu may be slow or unresponsive. more…

Demystifying Machine Learning: How to Turn the Buzzword into Real Benefits for Endpoint Security

Machine learning has become the most popular new theme in security. Seemingly every vendor is adopting this capability in an attempt to either keep up or to make their product stand out in a crowded market. This creates confusion, because the term itself is often misunderstood, and the implications of its use are varied. Not […] more…

Neptune Exploit Kit Used to Deliver Monero Miner

Cybercriminals have been using the Neptune exploit kit to deliver cryptocurrency miners via malvertising campaigns, FireEye reported on Tuesday. read more more…

‘Smart’ solar power inverters raise risk of energy grid attacks

Researcher identifies a weakness in the software layer – and reminds us that we’re placing a lot of trust in vendors to implement decent security in formerly passive devices more…

Instagram Takes Huge Step to Filter Bullies, Become a Kinder Social Hub

You’re a jerk. You’re a fat pig. You’re disgusting.  It’s hard to imagine seeing these words written about anyone, but it happens every minute online. But hopefully, Instagram users will be noticing a kinder vibe thanks to the platform’s decision to automatically delete hateful, bullying comments. Instagram, the third most popular social network with 700 […] more…

2017 Antivirus News | Powered by WordPress | Fluxipress Theme | Show My IP Address, check blacklists | Free Favicon, Android and Apple Icon Generator | Bitcoin and Crypto Currency News