IT Brief UK - Technology news for CIOs & IT decision-makers

Security vulnerabilities stories - Page 20

Cybersecurity25

Apple issues clarification on extent of iOS malware infection

Wed, 11th Sep 2019
#
endpoint protection
#
edr
#
apple
Apple clarifies that an iOS malware attack impacted fewer than a dozen Uighur-focused websites, dismissing Google's claims of mass exploitation.
Mobile services2

Security flaw left Android phones open to SMS phishing attacks found

Tue, 10th Sep 2019
#
endpoint protection
#
phishing
#
email security
A security flaw in Samsung, Huawei, LG, Sony and other Android phones leaves users open to SMS phishing attacks, Check Point Research reports.
Iphone home screen

How the iPhone malware discovery affects Apple users – Malwarebytes

Wed, 4th Sep 2019
#
malware
#
cybersecurity
#
ios
The malware implant has been patched, but iPhone users should ensure they're running on the latest version of iOS (12.1.4) to leverage the security patches.
Fallback

Puppet launches vulnerability remediation product

Thu, 22nd Aug 2019
#
it automation
#
cybersecurity
#
security vulnerabilities
With vulnerabilities and security breaches on the rise, the latest Puppet product helps IT teams find, prioritise and remediate vulnerabilities.
Gettyimages 669614252

Popular enterprise printers riddled with security risks

Thu, 15th Aug 2019
#
hp
#
printing
#
brother
Researchers from NCC Group analysed different aspects of six mid-range enterprise printers manufactured by HP, Ricoh, Xerox, Lexmark, Kyocera, and Brother.
Malware1

Check Point: Attackers executing commands remotely with latest malware

Wed, 14th Aug 2019
#
malware
#
iot security
#
cybersecurity
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
Gettyimages 941800436

F5 Networks' BIG-IP load balancer product vulnerable to attack

Tue, 13th Aug 2019
#
supply chain
#
f5 networks
#
f-secure
Security vulnerabilities in F5 Networks' popular BIG-IP load balancer could enable attackers to exploit iRules and gain unauthorised access, warns F-Secure.
Cybersecurity40

Cohesity launches new vulnerability scan using backup data

Tue, 6th Aug 2019
#
cybersecurity
#
security vulnerabilities
#
cyber attacks
The application works by scanning backup copies on to identify any vulnerabilities across an organisation's IT environment.
Gettyimages 496835011

Vulnerabilities in cloud containers soar, report finds

Wed, 31st Jul 2019
#
cloud services
#
security vulnerabilities
#
containers
Cloud container vulnerabilities are on the rise, increasing by 46% compared to last year, according to Skybox Security's latest report.
Gettyimages 979008970

Huawei working to patch critical security vulnerabilities

Wed, 10th Jul 2019
#
security vulnerabilities
#
huawei
#
swascan
Huawei collaborates with Swascan to patch critical security flaws, underscoring that even tech giants like Adobe, Microsoft, and Lenovo are vulnerable.
Gettyimages 1040330634

UPDATED: Orvibo & Arlo smart home products patched to prevent attacks

Fri, 5th Jul 2019
#
vpns
#
surveillance
#
smart home
The security of smart home devices is once again under the spotlight this week, as two different device manufacturers come under fire for major vulnerabilities.
Gamer

Major vulnerability found Electronic Arts gaming client

Thu, 27th Jun 2019
#
gaming
#
digital entertainment
#
security vulnerabilities
Once exploited, the vulnerabilities would have led to player account takeover and identity theft, Check Point and CyberInt found.
Gettyimages 885332002

Slack users urged to update to prevent security vulnerability

Mon, 20th May 2019
#
security vulnerabilities
#
slack
#
tenable
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Gettyimages 1048265360

ZombieLoad: Another batch of flaws affect Intel chips

Thu, 16th May 2019
#
semiconductors
#
hyperscale
#
public cloud
Intel-powered computers are facing a new vulnerability called 'ZombieLoad' WHERE id = which allows attackers to leak information from protected memory.
Gettyimages 945200518

Forget endpoints—it's time to secure people instead

Thu, 16th May 2019
#
malware
#
wireless networks
#
zero trust security
Security paradigms need a shift; as mobile work ensues, companies must pivot from endpoint protection to securing the actual users.
Gettyimages 1139635207

PrinterLogic software vulnerable to remote attacks

Thu, 9th May 2019
#
printing
#
security vulnerabilities
#
printerlogic
Businesses using PrinterLogic Print Management Software are urged to deploy 'always on' VPNs amid new vulnerabilities that risk remote attacks on workstations.
Gettyimages 535898187

Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach

Thu, 18th Apr 2019
#
data analytics
#
martech
#
planning
Faced with an overload of 'critical' vulnerabilities, Tenable turns to predictive solutions, launching a tool that targets the top 3% of likely exploits.
Vulnerability

Sonatype and HackerOne partner on open source vulnerability reporting

Mon, 25th Mar 2019
#
partner programmes
#
supply chain
#
open source
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process.
Thinkstockphotos 508373762

Logitech Harmony Hub vulnerabilities leave devs fuming

Tue, 5th Mar 2019
#
iot
#
logitech
#
security vulnerabilities
Logitech backtracks on decision to remove firmware version of Harmony Hub, after critical security flaws were revealed. Millions of users affected.
Github octocat detective

GitHub's Bug Bounty program gets bigger

Mon, 4th Mar 2019
#
martech
#
apm
#
software development
GitHub's Bug Bounty program is now five years old and to mark the occasion it has revamped the program's scope, rewards, and new legal rules.