Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn what critical approaches can protect your enterprise business from software vulnerabilities. Also, learn about vulnerabilities in IoT alarms that let hackers hijack cars.
There are several critical approaches today’s businesses and IT teams can take to safeguard their organization from software vulnerabilities.
Researchers have found a severe issue in the new Swiss internet voting system that they say would let someone alter votes undetected. They say it should put a halt to Switzerland’s plan to roll out the system in real elections this year.
Trend Micro recently came across a previously unknown malware that piqued interest in finding how the malware was spread via water hole attacks and was connecting to the slack Platform.
The Navy and its industry partners are “under cyber siege” by Chinese hackers and others who have stolen national security secrets in recent years, exploiting critical weaknesses that threaten the U.S.’s standing as the world’s top military power.
When malware is difficult to discover, Trend Micro proposes a machine learning model that uses adversarial autoencoder and semantic hashing to find what bad actors try to hide.
The growth of 5G and the Internet of Things may be helping to bring smarter and more connected experiences and services around the world, but may also be exposing users to more security worries.
Vulnerabilities in third-party car alarms managed via their mobile applications were uncovered and seem to affect around 3 million cars that use these “smart” internet-of-things (IoT) devices.
Facebook filed a lawsuit against two Ukrainian nationals who allegedly used personality quizzes to steal user information from 63,000 people between 2016 and 2018, mostly in Russia.
Popular open-source DevOps automation software StackStorm was reported to have a critical vulnerability that could allow remote attackers to perform arbitrary commands on targeted servers.
Do you think vulnerabilities in IoT car devices will decrease throughout the year? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.