Cyber Security News

October 2018

241.

Morrisons Loses Appeal Against Data Breach Liability Ruling

242.

DHS Preps Extra Cyber Support for States with Close Midterm Races

243.

FDA Takes Steps to Beef Up Medical Device Security Bona Fides

244.

MNIT Commissioner Faces Legislative Scrutiny Over Phishing Attacks

245.

The Most Interesting Internet-connected Vehicle Hacks on Record



246.

Top Vehicle Hacking Examples (in Pictures)

247.

Australians Made Over 19K Privacy Principle Enquiries in 2017-18

248.

Safeguarding Hybrid-cloud Infrastructures Through Identity Privilege Management

249.

Security Budgets Are Rising, But Is It Enough?

250.

USA and China Identified as Top Cyber Attack Sources



251.

Flaw in Media Library Impacts VLC, Other Software

252.

Hackers Deface Website Of Saudi Investment Forum

253.

Securing the Vote Against Increasing Threats

254.

WordPress Team Working on "Wiping Older Versions From Existence on the Internet"

255.

Trade.io Loses $7.5Mil Worth Of Cryptocurrency in Mysterious Cold Wallet Hack


Outfoxing the bad guys? Let's talk.


256.

After Estonia's Id-card Train Wreck This Identity App Is Taking Baltics By Storm: Security

257.

Housekeeping Co. Hit with Privacy Suit Over Fingerprinting

258.

Native, Animal Groups Launch Privacy-Based Climate Suit

259.

Investor Drops Suit Over Cryptocurrency Hacking

260.

Centralised Identity Risky and Not Web 3.0 Friendly, Says Entrepreneur


Why wait until you get hacked?
Let the Secmentis hacker team test your security today.


261.

GSA Took 800 Days to Notify Some Data Breach Victims

262.

Hackers Breach Healthcare.gov

263.

Cyber Crime Has Tumbled 30%, Says ONS - But Has It?

264.

Amazon, Super Micro Join Apple in Demanding Retraction Of Bloomberg Story on Hacked Server Boards

265.

Macron Among First Leaders to Slam Trump's Plan to Quit Inf Accord: Harmful for European Security


What's the worst that could happen?
(Hint: Your trade secrets could be stolen...)


266.

Watch Hackers Steal a Tesla

267.

3 Ways Politicians Could Prevent Voting Machines From Being Hacked (if They Wanted To)

268.

Each Brain Cell Acts Like a Minicomputer Processor

269.

CYBERCOM Seeks an Integrator for Its Cyber Training Environment

270.

GSA Took 800 Days to Notify Some Data Breach Victims

Secmentis specializes in offensive security and provides penetration testing services to organizations worldwide. We provide penetration testing services such as, external and internal network penetration testing, web application and mobile application penetration testing, and physical penetration testing and social engineering.

The headlines on Secmentis Cyber Security News are selected by computer algorithms that determine which headlines are displayed and in what order.

 Hackers are active 24/7. Are you?

Talk to us today to find out how our experts can best help you