Articles from ITBoB Home (trending on the web)

Cybersecurity best practices for facilitating IT/OT integration

The German government released an incident report in December detailing a targeted cyberattack on a steel mill blast furnace that resulted in "massive" damage. The translated report reveals that attackers were able to compromise the steel mill’s corporate network, and from there reach into the production network. Fortunately, no lives were lost, but this event serves as a rallying cry for the safe integration of IT networks with operations technology (OT) networks.

Study: More privacy-violating apps come from the US than Korea, Taiwan, China, and India combined

A report from Marble Security claims more privacy-invading applications are made in the United States than in Korea, Taiwan, China, and India combined. “It’s a common misconception that the risk of using mobile devices is limited to jailbroken or rooted devices in Asia, and apps that are downloaded from fly-by-night app stores other than the Apple App Store or Google Play,” Marble Security says in the short preamble to its report. “Nothing […]

Scareware found hidden in Google Play apps downloaded by millions

Google has done a good job at keeping data-stealing Trojan apps out of Google Play, but attackers still find ways to monetize rogue apps through the store.Avast Software researchers recently found three apps on Google Play with hidden adware functionality that was designed to activate days after the apps were installed. The rogue applications—a game called Durak, an IQ test and a history app—had been downloaded millions of times.When people first install Durak, it looks and acts like a normal gaming app, Avast researcher Filip Chytry said in a blog post Tuesday.

This is huge: FCC chairman's strong net neutrality proposal turns the Internet into a public utility

U.S. Federal Communications Commission chairman Tom Wheeler just pulled out the big gun in the net neutrality battle: In an op-ed published on Wired, Wheeler announced a proposal to invoke the agency’s Title II authority, which would allow the FCC to regulate broadband Internet service as a public utility, similar to phone service. And he did so in strong, no-nonsense terms:

Microsoft’s Outlook for iOS receives both high praise and a big ‘Warning’ regarding user security

Following last week’s release of Microsoft’s preview version of Outlook for Android, and a new version of Outlook for iOS there have been mostly positive reviews popping up over the last few days, as well as Microsoft’s flattering statement that … Continue reading →

A flaw in BMW and Rolls Royce cars lets hackers unlock the doors

A new-found security flaw means that hackers are able to break in and unlock the doors of  BMW, Rolls Royce, and Mini cars. The Register reports that the German motoring association ADAC has discovered a problem with ConnectedDrive, the software that lets you open the door of your car with your smartphone. Hackers can combine security flaws in door-locking software with a previously discovered method from 2012. That hack used blank car keys to fool luxury vehicles into thinking its owner was trying to unlock the door.

HTC delays Lollipop for carrier models of One M7 and M8

Rome wasn't built in a day, and some things take more than 90 days to make. After starting a new trend of transparency among manufacturers, HTC is now effectively breaking its 90-day guarantee. It has announced that it will take longer for carrier versions of its 2013 and 2014 One flagship to get their Android 5.0 dessert and it is … Continue reading

Pages