Wednesday, January 18, 2017

Controversial vulnerabilities in IoT medical devices finally patched

Security Digest
Information security news and advice from TechTarget's network | January 18, 2017
TechTarget
FEATURED STORY
St. Jude Medical finally patches vulnerable medical IoT devices
by Madelyn Bacon, Assistant Site Editor

News roundup: St. Jude Medical patches vulnerable medical IoT devices after a five-month controversy. Plus, the Email Privacy Act is reintroduced; Juniper warns of a firewall flaw; and more. (SearchSecurity.com)

Advertisement
NEWS
 
Gmail phishing campaign uses real-time techniques to bypass 2FA

Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real-time. (SearchSecurity.com)

 
Google Cloud KMS simplifies the key management service, but lacks features

Experts are impressed with the simplicity of Google's Cloud KMS even if it doesn't separate itself from the key management service competition. (SearchSecurity.com)

 
Flawed GoDaddy security certificates show need for control
Vulnerabilities in digital security certificates highlight the need for organisations to be able to exercise more control over those certificates. (ComputerWeekly.com)
 
 
 

Microsoft privacy tools give users control over data collection

New Microsoft privacy tools will give users control over the data collected on the web and within Windows. Experts hope the tools will offer data privacy transparency. (SearchSecurity.com)

 
Insecure MongoDB configuration leads to boom in ransom attacks
Poor authentication in MongoDB configurations has led to a sharp increase in ransom attacks, and experts say tens of thousands of databases could be at risk. (SearchSecurity.com)
 
Risk & Repeat: CES Cybersecurity Forum tackles passwords, IoT
In this episode of SearchSecurity's Risk & Repeat podcast, editors highlight the topics discussed at the CES Cybersecurity Forum, as well as new technologies showcased at the event. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
Managing vulnerable software: Using data to mitigate the biggest risks

Three pieces of vulnerable software are most targeted by the exploit kits studied in a Digital Shadows report. Expert Nick Lewis explains how your enterprise can manage them. (SearchSecurity.com)

 
How the Flip Feng Shui technique undermines cloud security
The Flip Feng Shui attack against hypervisors could have both short and long-term effects on enterprises. Expert Ed Moyle explains how the exploit works and how to deal with it. (SearchCloudSecurity.com)
 
 
 
 

Insider threat detection tools that sniff out dangers from within

Learn about the insider threat detection tools that can zero-in on anomalous user behavior. Malicious or accidental, the insider threat is one of the most dangerous and costly to companies. (SearchSecurity.com)

 
How do man-in-the-middle attacks on PIN pads expose credit card data?

Passive man-in-the-middle attacks on PIN pads can lead to attackers stealing credit card details. Expert Nick Lewis explains how companies can mitigate these attacks. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.
TechTarget

No comments: