Remove Authentication Remove Manufacturing Remove Metadata
article thumbnail

Volvo retailer leaks sensitive files

Security Affairs

The Brazilian retail arm of car manufacturing giant Volvo leaked sensitive files, putting its clientele in the vast South American country in peril. Volvo’s retailer exposed its database’s authentication information, including MySQL and Redis database hosts, open ports and credentials. The issue causing the leak has been fixed.

Retail 98
article thumbnail

A million at risk from user data leak at Korean beauty platform PowderRoom

Security Affairs

Backed by beauty-product manufacturers, PowderRoom has hundreds of thousands of followers on social media, and its Android app has been downloaded more than 100,000 times on Google Play. Among the leaked data, researchers found a million tokens used for authentication and accessing the website.

Risk 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security cameras, CAN-SPAM, and “reasonable or appropriate security”

Data Protection Report

On August 30, 2024, the Federal Trade Commission (FTC) announced a proposed settlement with security camera manufacturer Verkada Inc., claiming Verkada committed a variety of unfair or deceptive acts or practices in violation of § 5 of the Federal Trade Commission Act and CAN-SPAM in connection with a security breach.

article thumbnail

NSA, CISA Release Guidance for Choosing and Hardening VPNs

eSecurity Planet

28 NSA-CISA document (PDF download) urges buyers to use standards-based VPNs from vendors with a track record of swiftly addressing known vulnerabilities and using strong authentication credentials. Examine whether a product offers strong authentication credentials and protocols by default, as opposed to weak credentials and protocols.

article thumbnail

SBOMs: Securing the Software Supply Chain

eSecurity Planet

A software bill of materials (SBOM) is a machine-readable inventory of components, dependencies, metadata, and the hierarchical relationship for a given software product. In any instance, cryptographic authentication of SBOMs is imperative for verifying their authenticity. What is a Software Bill of Materials (SBOM)?

Security 135
article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Deliver new insights Expert systems can be trained on a corpus—metadata used to train a machine learning model—to emulate the human decision-making process and apply this expertise to solve complex problems. Manufacturing Advanced AI with analytics can help manufacturers create predictive insights on market trends.

article thumbnail

Weekly Vulnerability Recap – Sept. 11, 2023 – Android Update Fixes 33 Vulnerabilities

eSecurity Planet

Alarmingly, this API lacks any form of authentication, allowing virtually anyone, even a malicious website you might visit, to send commands to the CLI. They can be remotely exploited without authentication, potentially enabling remote code execution, service disruptions, and arbitrary operations on the routers. via port 8076.