CloudPets stuffed toys leak details of half a million users

The personal information of more than half a million people who bought internet-connected fluffy animals has been compromised. The details, which include email addresses and passwords, were leaked along with access to profile pictures and more than 2m voice recordings of children and adults who had used the CloudPets stuffed toys. The US company’s toys can connect over Bluetooth to an app to allow a parent to upload or download audio messages for their child. …

Source: CloudPets stuffed toys leak details of half a million users

Share

Major security flaw in Samsung Knox could give hackers ‘full control’ of your phone

Israeli researchers found three vulnerabilities in Samsung Knox – they have since been patched but out-of-date devices may still be at risk. … Researchers from Israeli firm Viral Security Group exposed the flaws in Samsung’s Knox system, which they say “allowed full control” of a Samsung Galaxy S6 and the Galaxy Note 5 …

Source: Major security flaw in Samsung Knox could give hackers ‘full control’ of your phone

Share

Security guide for BlackBerry powered by Android

This guide describes the privacy and security of BlackBerry devices powered by Android, including:

  • The value of embedding security into the end points to create a hardware Root of Trust
  • Layered defenses we’ve added throughout the mobile device stack, including the hardware platform, firmware, mobile OS, and secure communications and collaboration apps
  • How we’ve secured the Android OS
  • The flexibility of various deployment models that allow you to secure devices regardless of who owns them, which network they’re on, and which EMM solution you use
  • The end-to-end BlackBerry security platform, including device security, app security, secure device management, secure network connectivity, security patch and upgrade management, and more …

Source: Security guide for BlackBerry powered by Android

Share

‘Alarming’ number of businesses hit by hackers in past year: poll

Half of Canadian C-suite executives and nearly a quarter of entrepreneurs say their businesses’ cybersecurity was breached in the past year, according to a new study from accounting, tax and business consulting firm MNP LLP.

Conducted by Ipsos in January and released Monday, the survey of 100 Canadian executives of medium- and large-sized businesses also polled 1,000 small-business owners. While 93 per cent of the combined groups said they felt their companies effectively protected customer data, nearly three in five of those polled “either suspect or know for certain” they were victims of hacking attempts. …

Source: ‘Alarming’ number of businesses hit by hackers in past year: poll

Share

QNX OS for Security

The QNX OS for Security delivers the OS that aerospace, defense and security systems need to meet the stringent security requirements of mission-critical applications.

In addition to the field-proven reliability of the standard QNX Neutrino RTOS, the QNX OS for Security provides different privilege levels for different applications, mediation to verify all accesses, and a mechanism for resource protection.

The QNX OS for Security is certified to Common Criteria ISO/IEC 15408 Evaluation Assurance Level (EAL) 4+.  It is a full-featured RTOS that:

  • Is certified under the common criteria standard
  • Includes symmetric multi-processing (SMP) support for multi-core processors
  • Includes the unique QNX adaptive partitioning technology in the certification

The microkernel architecture provides proper isolation between all aspects of a system, including filesystems and networking stacks. …

Source: QNX OS for Security

Share

Distinctly Different, Distinctly BlackBerry: Our Partner TCL Launches BlackBerry KEYone, an All-New Secure Android Smartphone

Congratulations to our partner TCL Communications, who today at Mobile World Congress launched BlackBerry KEYone, the first smartphone announced under our new brand and device-licensing strategy. … In addition to the strong security and power productivity features, users will enjoy a physical keyboard that provides more flexibility and usable space for typing compared to your everyday smartphone. The physical Smart Keyboard mimics the heritage of the BlackBerry trackpad by responding to touch gestures, making web browsing, reading, and writing with flick typing a much easier and more intuitive experience. The keyboard also can be easily programmed to launch up to 52 customizable shortcuts, such as pressing “I” for your inbox or “M” to access maps. In addition, KEYone is the first smartphone to build a fingerprint sensor directly into the keyboard spacebar for added functionality and security. …

Source: Distinctly Different, Distinctly BlackBerry: Our Partner TCL Launches BlackBerry KEYone, an All-New Secure Android Smartphone

Share

WhatsApp vulnerability allows snooping on encrypted messages

A security vulnerability that can be used to allow Facebook and others to intercept and read encrypted messages has been found within its WhatsApp messaging service.
Facebook claims that no one can intercept WhatsApp messages, not even the company and its staff, ensuring privacy for its billion-plus users. But new research shows that the company could in fact read some messages due to the way WhatsApp has implemented its end-to-end encryption protocol. …

Source: WhatsApp vulnerability allows snooping on encrypted messages

Share

Security lapse exposed New York airport’s critical servers for a year

A security lapse at a New York international airport left its server backups exposed on the open internet for almost a year, ZDNet has found. The internet-connected storage drive contained several backup images of servers used by Stewart International Airport, but neither the backup drive nor the disk images were password protected, allowing anyone to access their contents. …

Source: Security lapse exposed New York airport’s critical servers for a year

Share

Malware Infects Most Hospitals. Here are 10 Steps to Cure This Epidemic

We’re experiencing an alarming, disturbing epidemic in the healthcare industry: the proliferation of malware. Research last year found that 75% of healthcare organizations have been hit by malware attacks, much of it ransomware, with attacks against the Enterprise of Things a growing concern.
As a medical doctor, I see how hospitals are targeted disproportionately by malware, putting a treasure trove of valuable patient health information at risk. Modern hospitals’ interconnected digital platforms, such as integrated billing and electronic health records, and our increasing use of Internet of Things (IoT) devices are putting people’s health and privacy at risk. …

Source: Malware Infects Most Hospitals. Here are 10 Steps to Cure This Epidemic

Share

Sentegrity Delivers Risk-based Authentication to BlackBerry Dynamics

Sentegrity, the leader in risk-based behavioral authentication, announced a partnership with BlackBerry to provide trusted authentication for applications on the BlackBerry Dynamics platform. Sentegrity can now be automatically called by any BlackBerry application on launch to modulate the stringency of the authentication requirements based on trusted baselines of user behavior and device integrity. …

Source: Sentegrity Delivers Risk-based Authentication to BlackBerry Dynamics | Sentegrity

Share