Tagged: customers Toggle Comment Threads | Keyboard Shortcuts

  • jkabtech 12:17 pm on March 17, 2018 Permalink | Reply
    Tags: , customers, , , , Remix   

    Jide Discontinues Remix OS, Moves Focus to Business Customers 

    Highlights The company launched Remix OS for PC last year The company says that backers from KickStarter will be refunded Jide says it will be focussing on enterprise customers now

    Jide Technology on Tuesday announced that the company has decided to discontinue its Android-based Remix OS and that it will be “transitioning away” from consumer space. For those who are unaware, Remix OS is essentially a customised form of Android for the desktop form factor that was launched in January last year.

    In a note from Jide, the company says that it has received a large number of queries from enterprises in various industries in the last one year and the company can help these enterprises build “great tools” by leveraging its software and hardware.

    “We see huge potential in the role that Jide can play to revolutionize how these businesses operate. And given our existing resources, we decided to focus our company efforts solely on the enterprise space moving forward,” it said.

    Jide says that it is restructuring its approach to Remix OS and as a result, the development on all existing products like Remix OS and other products in pipeline such as Remix IO and IO

    View the Original article

  • jkabtech 4:17 am on December 14, 2017 Permalink | Reply
    Tags: customers, , , patching, pwned, scolds   

    Oracle scolds customers for not patching and getting pwned 

    While releasing another massive monthly critical patch update.

    Oracle has chided customers for failing to apply patches to its products in a timely manner and therefore falling victim to attackers.

    The enterprise IT vendor today said it continued to “periodically receive reports” of attempts by attackers to exploit vulnerabilities that it had already released fixes for.

    It said the attackers were occasionally successful because the targeted Oracle customers had failed to apply available patches.

    “Oracle therefore strongly recommends that customers remain on actively-supported versions and apply critical patch update fixes without delay,” the company said.

    It made its comments as part of an advisory about its critical patch update for October 2017.

    This quarter’s collection of security patches includes 252 fixes. The figure is down from the 308 patches Oracle released in July and the 300 that were provided in April, but is higher than January’s count of 209.

    However the October collection contains a high number of remote code execution flaws that don’t require user credentials to exploit.

    The RCEs were found in the likes of Oracle Siebel CRM, PeopleSoft, Fusion Middleware, E-Business Suite, JD Edwards and MySQL.

    This month’s patch update also fixes two critical flaws in Oracle’s Java application development framework and code runtime, within the Hotspot and Remote Method Invocation components.

    Both can be exploited remotely to run arbitrary code without user authentication on vulnerable systems.

    Security vendor ERPscan analysed the October 2017 bundle and singled out three critical vulnerabilites that had earned the full 10 out of 10 common vulnerability scoring system (CVSS) rating.

    The three flaws were found in Oracle’s Hospitality Reporting and Analytics software and have been labelled priority fixes.

    Oracle’s Siebel Apps – Field Service also has a 10 CVSS-rated flaw that can be exploited to completely take over the software.

    ERPscan founder and chief technical officer Alex Polyakov said the October patch update also contains “an alarming number of PeopleSoft fixes”. 

    Of the 23 PeopleSoft vulnerabilities in the bundle, 13 can be exploited remotely over networks without entering user credentials, Polyakov said.

    “Over 1000 PeopleSoft systems are discoverable on the internet simply by Google or Shodan.io scanning, therefore putting organisations at risk because of the recent vulnerabilities,” he said.

    View the Original article

  • jkabtech 4:17 am on October 10, 2017 Permalink | Reply
    Tags: customers, ,   

    NBN customers targeted by scammers 

    Beware of connection offers and phishing attempts.

    Scammers impersonating NBN Co have tricked several hundreds of people and caused tens of thousands of dollars in losses, the Australian Competition and Consumer Commission has warned.

    The ACCC said scammers were calling people and offering to connect them to the NBN for a low price.

    Payment is requested through Apple iTunes gift cards, but the connections are never completed.

    Criminals have also impersonated NBN Co to trick users into giving remote access to their computers, the ACCC said.

    Once remote access has been granted, the scammers steal valuable personal information, install malware, and demand payment to fix supposed problems.

    The watchdog also warned about NBN fraudsters asking for sensitive personal information such as name, address, Medicare and driver’s licence numbers, which they will use for identity theft and other fraud.

    Older Australians in particular are being targeted.

    So far, the consumer watchdog’s Scamwatch scheme has received 316 complaints this year alone about NBN scammers who have caused almost $28,000 in losses.

    The ACCC advised people not to sign up to the NBN via an unsolicited phone call, and not to agree to payments requested in iTunes gift cards.

    People should also never give out personal, credit card, or online account details when called out of the blue, or give unknown individuals remote access to their computers.

    View the Original article

  • jkabtech 8:17 pm on August 23, 2017 Permalink | Reply
    Tags: , 108, customers, , , steals   

    Bupa employee steals data for 108,000 global customers 

    Personal details exposed.

    An employee “copied and removed” the personal information of more than 100,000 international health insurance plan customers from the systems of health insurer Bupa.

    The data included names, dates of birth, nationalities, some contact and administrative information. No medical or financial data is at risk.

    The now ex-staffer is believed to have made the information they have available to “other parties” too, according to a letter sent to the 108,000 international health insurance policy holders from Sheldon Kenton, managing director of Bupa Global, the firm’s international health insurance division.

    “We know that this will be concerning and I would like to personally apologise,” Kenton said in the letter.

    She said the company had introduced additional security measures and increased customer identity checks as a result of the breach.

    “A thorough investigation is underway and we have informed the FCA and Bupa’s other UK regulators. The employee responsible has been dismissed and we are taking appropriate legal action.”

    She said the firm has been in touch with UK data watchdog the Information Commissioner’s Office (ICO) and the police.

    The firm has not provided detail on which “other parties” may have access to the data, nor when the incident took place.

    Security expert Graham Cluley said the data would allow criminals to phone customers posing as Bupa Global staff, sharing enough information about customers to persuade their victims to part with more valuable data.

    “It’s easy to imagine how someone vulnerable could get a phone call out of the blue, believe it’s Bupa, and give the criminals valuable information,” he said.

    This article originally appeared at itpro.co.uk

    Copyright © ITPro, Dennis Publishing Tags:bupa data breach financeit healthit security By Staff Writer
    Jul 14 2017
    6:56AM Security is
    powered by

    View the Original article

  • jkabtech 8:17 pm on August 18, 2017 Permalink | Reply
    Tags: customers, Groups, internal,   

    G Suite customers leak internal data via Groups 

    Tick a box configuration mistake.

    A simple configuration mistake has seen hundreds of companies using Google’s G Suite productivity platform publish internal information to the internet, researchers have found.

    G Suite provides the Google Groups sharing and messaging service, which was originally designed as a gateway to Usenet newsgroups.

    In an advisory

    View the Original article

  • jkabtech 6:51 am on April 29, 2016 Permalink | Reply
    Tags: customers, , , ,   

    Report: 1.5 million Verizon customers hacked 

    itemsPerPage:1 ,itemsPerTransition:1 ,speed:500 ,swipable:true ,nextPrevLinks:true ,container: ‘multi_promo_103495731_1’ ,currentNodeClass: ‘currentNode’ ,lazyLoad: false ,lazyLoadNext: false,responsive:false

    View the Original article

  • jkabtech 1:20 am on March 29, 2016 Permalink | Reply
    Tags: customers, , , ,   

    Report: 1.5 million Verizon customers hacked 

    Thursday, 24 Mar 2016 | 4:22 PM ETCNBC.com

    A pedestrian talks on his cell phone while walking past the Verizon Communications Inc. headquarters in New York. Andrew Harrer | Bloomberg | Getty ImagesA pedestrian talks on his cell phone while walking past the Verizon Communications Inc. headquarters in New York.

    More than 1.5 million Verizon Enterprise customers had their contact information leaked on an underground cybercrime forum this week, according to cybersecurity blogger Brian Krebs.

    A security vulnerability, now fixed, provided an opening for the attacker, the business-to-business arm of the mobile and telecom giant told KrebsoOnSecurity. The breach involved basic contact information, not propriety network information, the company told Krebs.

    Prices of the customer data ranged from $10,000 to $100,000, Krebs reported.

    Verizon, used by almost all Fortune 500 companies, is widely known for its cybersecurity prowess, and releases an annual report on avoiding cyberthreats, Krebs wrote.

    Verizon told CNBC that impacted Verizon Enterprise customers are being notified, and no data about consumer customers was involved.

    For the full story, read more at KrebsOnSecurity.com.

    — CNBC’s Ryan Ruggiero contributed to this report.

    SHOW COMMENTS Please add a username to view or add commentsPublic Username for Commenting

    View the original article here

Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc
%d bloggers like this: