It turns out that story about guests being locked out of, and locked into, their hotel rooms in a four-star hotel in Austria aren’t exactly accurate. According to this story in The Verge, Don’t believe the story about hackers locking guests in their rooms at a luxury hotel while what happened is still very interesting, and of concern to any traveler, what was reported wasn’t entirely accurate.
All about Virtualization and Cloud Security | Recent Articles:
Bitdefender’s Business Insights nominated at the 2017 Security Blogger Awards – Cast your vote!
Dear reader: if we had the chance, we would definitely name you the Best Corporate Security Blog Reader out there.
Bitdefender Hypervisor Introspection Fights Advanced Persistent Threats in Datacenters
From 1960s mainframes to today’s datacenters, computing has changed drastically, in both hardware and software. Today’s converged infrastructures bring together hardware and software to redefine how we operated, helping businesses to cut costs while maintaining availability and performance.
A warning has been issued that companies who have installed the popular Cisco WebEx extension on Chrome could have opened themselves up to malicious attacks.
Security on the Road: Automotive Industry Needs to Make Cyber Security a Top Priority
Not too long ago, most people probably couldn’t imagine their automobiles being vulnerable to cyber security threats such as hacking. But with the rapid growth of connected objects of all types as part of the Internet of Things (IoT)—including vehicles—these concerns have become a distinct possibility.
One in five companies will replace physical access cards with smartphones by 2020, Gartner predicts
Some 20 percent of organizations will use smartphones instead of physical access cards by 2020, according to a report by advisory company Gartner.
Last week medical device maker St. Jude Medical provided security patches and guidelines necessary regarding vulnerabilities in its Internet connected medical devices that were uncovered this summer. You can read the original report from investment research firm Muddy Waters Research here.
A recent report by the Institute for Critical Infrastructure Technology (ICIT), a cyber security think tank that acts as a conduit between the private sector, U.S. federal agencies and the legislative community, paints a frightening picture of the information security landscape.
How patented machine-learning boosts ransomware detection and prevents businesses from being encrypted
Ransomware, the most prolific cyber threat of the moment, gains foothold in organizations and companies via file-sharing networks, e-mail attachments, malicious links or compromised websites that allow direct downloads.
With studies showing some 57 percent of organizations have experienced a recent cybersecurity incident, 48 percent of those were caused by outdated security controls and architecture. Browsers often create security issues for an organization, and they run a full range of plugins that can create headaches for IT teams in managing, updating and controlling what employees install.
Fight off Advanced Persistent Threats with Bitdefender Hypervisor Introspection at Citrix Summit 2017
Cybercrime is estimated to cost $6 trillion by 2021, while spending on cybersecurity solutions to safeguard infrastructure is forecast to surpass $1 trillion. Growing security challenges due to system vulnerabilities and misconfigurations turn over 1 million people into cybercrime victims every day.
Let’s face it, when it comes to cybersecurity, 2016 was quite a fascinating year. And while we experienced the traditional breaches this year—data theft for fraud, identity theft, and financial gain—many of the most significant breaches this year were not financially motivated, but political or activist in nature.
The U.S. Government has taken steps it hopes will better protect the users of medical devices, such as pacemakers and insulin pumps, from cyberattacks. For years now the risks of connected medical devices have been demonstrated and well-known. It’s an area we’ve covered here for some time.
There are many reasons why an enterprise may want to implement a bug bounty program. Most notably is that no matter how good an organization’s software testing is, how proficiently developers code security, or how thorough an organization’s software security assessments– there will always be flaws. These flaws make it possible for attackers to exploit security vulnerabilities and bypass security defenses.
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (7)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (24)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (81)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)