application security

Connected Office

Survey finds Device Makers Security Priorities Often Misplaced

Low-hanging Internet of Things security fruit may be left unpicked, as connected device makers fret about the predation of sophisticated hackers, but balk at simple security fixes, a Security Ledger and LogMeIn survey finds. You can download the full report here in PDF format.

ransomware

UPDATED: Is this Cyber War? Ransomware Attack Hits Banks, Transport, Government in Ukraine

Fast spreading ransomware dubbed Petya has crippled parts of Ukraine and hit companies in The Netherlands, France, Russia and Spain. It appears to be spreading using a combination of software exploit and stolen passwords.

code on a monitor

Code Tutorials Spread Application Flaws Far and Wide

In-brief: Researchers at universities in Germany, working with the security firm Trend Micro, discovered more than 100 vulnerabilities in GitHub code repositories simply by looking for re-used code from tutorials and other free code samples. The same method could be harnessed by cyber criminals or other sophisticated attackers to find and exploit vulnerabilities in software applications, the researchers warned.

Samsung’s Tizen Operating System: a Hacker’s Dream | Motherboard

In-brief: Motherboard reports on an audit of Samsung’s Tizen mobile and IoT operating system that suggests it contains numerous, serious security holes. 

Hack of Dallas Sirens Not the First or Last on Emergency Systems, Experts Warn

In-brief: The weekend hack of civil defense sirens in Dallas, Texas is similar to two incidents in Illinois in 2012. The underlying problem? Woeful security for emergency alerting and other civil defense systems in the U.S., according to security experts.