New Intel AMT Security Issue Lets Hackers Gain Full Control of Laptops in 30 SecondsRead Now
It's been a terrible new-year-starting for Intel. Researchers warn of a new attack which can be carried out in less than 30 seconds and potentially affects millions of laptops globally. ...
As Intel was rushing to roll out patches for Meltdown and Spectre vulnerabilities, security researchers have discovered a new critical security flaw in Intel hardware that could allow hackers to access corporate laptops remotely.
Finnish cyber security firm F-Secure reported unsafe and misleading default behaviour within Intel Active Management Technology (AMT) that could allow an attacker to bypass login processes and take complete control over a user's device in less than 30 seconds.
AMT is a feature that comes with Intel-based chipsets to enhance the ability of IT administrators and managed service providers for better controlling their device fleets, allowing them to remotely manage and repair PCs, workstations, and servers in their organisation.
recent Cyber attacksRead Now
MasterCard Launches Credit Card With Built-in Finger Scanner
MasterCard has unveiled its brand new payment card that has a built-in bio metric fingerprint scanner, allowing customers to authorize payments with their fingerprint, without requiring a PIN code or a signature.
The company is already testing the new bio metric payment cards, combined with the on-board chips, in South Africa and says it hopes to roll out the new cards to the rest of the world by the end of 2017.
324,000.00 Financial Record with CVV Numbers Stolen from Payment Getaway
Around 324,000 users have likely had their payment records stolen either from payment processor BlueSnap or its customer Regpack; however, neither of the company has admitted a data breach. BlueSnap is a payment provider which allows websites to take payments from customers by offering merchant facilities, whereas RegPack is a global online enrollment platform that uses BlueSnap to process the financial transactions for its online enrollments.
The data breach was initially reported on July 10, when a hacker published a link on Twitter, pointing to a file containing roughly 324,000 records allegedly stolen from Waltham, Massachusetts-based BlueSnap.
The tweet has since been deleted, but Australian security expert Troy Hunt took a copy of it for later review to analyze the data and after analyzing, he discovered that the leaked payment records are most likely legitimate.
Research Spots an ATM Skimmer While on Vacation in Vienna
We have heard a lot about ATM skimmers, but it's nearly impossible to spot one. Some skimmers are designed to look exactly like the card slot on the original machine and attached to the front, and others are completely hidden inside the ATM. But, during his vacation in Vienna, Austria, cyber security expert Benjamin Tedesco spotted an ATM skimmer that was totally unrecognizable.
iSaca cObit-5 turns 20 yearsRead Now
Rolling Meadows, IL, USA (12 April 2016)—ISACA’s COBIT framework, which helps organizations of all sizes and in all industries govern and manage their information and technology, turns 20 this year. In a new survey of COBIT users, more than 9 in 10 say they would recommend the COBIT 5 framework to others.
COBIT 5’s principles and enablers help organisations take a holistic approach to managing and governing information and related technology be governed holistically throughout an enterprise. Ultimately, the framework allows organisations to create value from IT by striking a balance between realizing benefits and optimising risk levels.
Twenty years after its launch—amid rising global cybersecurity threats—the guidance COBIT provides is becoming even more essential. More than 82% of survey respondents say the current cyber threat landscape has caused their organization’s leadership to value more highly the importance of GEIT.