article thumbnail

Volvo retailer leaks sensitive files

Security Affairs

The Brazilian retail arm of car manufacturing giant Volvo leaked sensitive files, putting its clientele in the vast South American country in peril. Volvo’s retailer in Brazil, Dimas Volvo, leaked sensitive files through its website. website, belonging to an independent Volvo retailer in the Santa Catarina region of Brazil.

Retail 96
article thumbnail

The Countdown to Black Friday Has Begun. Are Retailers and Consumers Ready?

Thales Cloud Protection & Licensing

So before the shopping frenzy begins, we thought this would be an opportune time to outline some best practices that both retailers and consumers should follow in order to protect consumer data. As convenience technologies evolve, look for more risks to consumers and retailers. Protecting Consumer Data is Priority #1. Back to basics.

Retail 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fortinet warns of a spike in attacks against TBK DVR devices

Security Affairs

FortiGuard Labs researchers observed a worrisome level of attacks attempting to exploit an authentication bypass vulnerability in TBK DVR devices. Threat actors are attempting to exploit a five-year-old authentication bypass issue, tracked as CVE-2018-9995 (CVSS score of 9.8), in TBK DVR devices.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Guest Blog: TalkingTrust. Imagine a world where the retail value of your car actually grows over time – that’s now becoming a reality. The same rings true for encryption and authentication. What’s driving the security of IoT? Thu, 03/11/2021 - 07:39. The Urgency for Security in a Connected World.

IoT 77
article thumbnail

Risk Management under the DORA Regulation

IT Governance

In fact, in 2020–2022, the financial sector was the second-most attacked sector, topped only by the retail and manufacturing sector. That said, remember to consider risks to the confidentiality, integrity, availability and authenticity of each ICT asset: Confidentiality : The asset is accessible to authorised people only.

Risk 104
article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 April 2024

IT Governance

In this instance, Kid Security failed to configure authentication for its Kafka Broker cluster, exposing at least 456,000 private social media messages, audio recordings, IP addresses, device locations, usage statistics and more for over a year. Source (New) Manufacturing USA Yes 1.1

article thumbnail

‘Tis the season for proliferating payment options…and risk

Thales Cloud Protection & Licensing

This year is expected to see similarly high numbers which is paralleled by increasing retailer anxiety about the state of their cybersecurity. In fact, according to our recent survey of retailers , 88% feel vulnerable to data threats. Almost 1 million visited physical stores. Happy (and safe!) holiday shopping.

Risk 90