Tag: password

A database containing 900 gigabytes of customer data and support requests for the Israeli firm Cellebrite was stolen and leaked to the website Motherboard. Cellebrite makes technology that helps law enforcement agencies get data off of mobile devices.

Surveillance Technology Vendor Cellebrite Has Customer Data Stolen

In-brief: Cellebrite, an Israeli firm that sells mobile phone forensic tools, was the victim of a hack that stole information on customers – many of them law enforcement agencies and governments.

New generations of Internet connected products are often insecure and pose safety and privacy risks to consumers. What will it take to make consumer electronics safe? We ask experts from the firm Senrio for their thoughts. (Image courtesy of CTA.)

Podcast: Can We Make CES Secure Again?

In-brief: With CES going on in Las Vegas, The Security Ledger sat down with three experts from the firm Senrio to talk about the new generation of connected consumer electronics. How vulnerable are they to attack? What is the best way to address security and privacy concerns in them? 

The New York Times expose on the hacks of the DNC is a case study in how not to respond to a cyber attack. We talk with Tim Bandos of Digital Guardian about building a cyber threat hunting capability.

Don’t Be The DNC: An Introduction to Enterprise Threat Hunting

In-brief: The New York Times expose on the hack of the Democratic National Committee is a case study in how not to respond to a cyber attack. In this video interview with Tim Bandos of Digital Guardian, we talk about how to do it right. His new ebook on hunting digital threats in the enterprise explains that incident response doesn’t have to cost a fortune. 

The FTC is being urged to take a stronger stand on Internet of Things security in order to protect consumers.

Lawmakers to FTC: Do Something about Internet of Things Security

In-brief: Two lawmakers on the U.S. House of Representatives’ Committee on Energy and Commerce are calling on the Federal Trade Commission to take steps to protect consumers from security issues linked to the Internet of Things.

Cyber criminals are rushing to compromise weakly secured devices like cameras and digital video recorders. (Image courtesy of OKhistory.org)

Land Rush: Race is On To Hack Vulnerable IoT Devices

In-brief:Cyber criminal groups are racing to gain control over a population of insecure “Internet of Things” devices, with new malware families targeting embedded devices appearing at a steady rate and a noticeable uptick in so-called “brute force” password guessing attacks against embedded systems.