Rapid7

Latest stories

1h
Belfast Telegraph
88 jobs created in Belfast at cyber security firm Alert Logic The new investment was supported by Invest Northern Ireland. Eighty-eight jo
88 jobs created in Belfast at cyber security firm Alert Logic
Belfast Telegraph / Posted an hour ago
The new investment was supported by Invest Northern Ireland. Eighty-eight jobs have been created in Belfast at a cyber security firm - with 30 already in place. Cyber security firm... Read more
4h
The Columbus Dispatch
Something new to worry about: Connected toy security NEW YORK — Your smartphone or tablet is most likely pretty secure — not perfe
Something new to worry about: Connected toy security
The Columbus Dispatch / Posted 4 hours ago
NEW YORK — Your smartphone or tablet is most likely pretty secure — not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it. The same... Read more
5 related stories
9h
Denver Post
Kids' connected toys might have security flawsNEW YORK — Your smartphone or tablet is most likely pretty secure — not perfec
Kids' connected toys might have security flaws
Denver Post / Posted 9 hours ago
NEW YORK — Your smartphone or tablet is most likely pretty secure — not perfect, maybe, but generally unlikely to be hacked or to store, say, your e-mail where other people could read it. The same can't be said for any Internet-connected toys you... Read more
5 related stories
1d
The Columbian
Something new to worry about: Web-connected toy securityNEW YORK — Your smartphone or tablet is most likely pretty secure — not perfect
Something new to worry about: Web-connected toy security
The Columbian / Posted yesterday
NEW YORK — Your smartphone or tablet is most likely pretty secure — not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it. The same can’t be said for any Internet-connected toys you may... Read more
5 related stories
1d
TribLIVE
Lax security for connected toys exposes kids to threats | TribLIVE Neighborhoods NEW YORK — Your smartphone or tablet is most like
Lax security for connected toys exposes kids to threats
TribLIVE / Posted yesterday
| TribLIVE Neighborhoods NEW YORK — Your smartphone or tablet is most likely pretty secure — not perfect, maybe, but generally unlikely... Read more
5 related stories
2d
Japan Today
Something new to worry about: Connected toy security ‹ Japan TodayYour smartphone or tablet is most likely pretty secure — not perfect, maybe, bu
Something new to worry about: Connected toy security ‹ Japan Today
Japan Today / Posted 2 days ago
Your smartphone or tablet is most likely pretty secure — not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it. The same can’t be said for any Internet-connected toys you may have... Read more
5 related stories
4d
The Register
Smart toys spring dumb vulns. Again. This time: Cuddly bears, watchesResearchers with arguably too much time on their hands have discovered security
Smart toys spring dumb vulns. Again. This time: Cuddly bears, watches
The Register / Posted 4 days ago
Researchers with arguably too much time on their hands have discovered security blunders surrounding Fisher-Price Smart Toys and hereO GPS watches for children. Even so, the failure by the toymakers to discover the flaws during quality control... Read more
5 related stories
4d
Wired News
NYC Launches Investigation Into Hackable Baby MonitorsFew scenarios conjure up digital nightmares darker than a hacked, Internet-conn
NYC Launches Investigation Into Hackable Baby Monitors
Wired News / Posted 4 days ago
Few scenarios conjure up digital nightmares darker than a hacked, Internet-connected camera pointing at a baby’s crib. After a string of incidents in which hackers have watched or even verbally harassed children through baby monitors, the devices... Read more
4d
International Business Times
Fisher Price's Smart Toy range found vulnerable to hacking Wi-Fi-enabled toys from Fisher Price could have put children's information on t
Fisher Price's Smart Toy range found vulnerable to hacking
International Business Times / Posted 4 days ago
Wi-Fi-enabled toys from Fisher Price could have put children's information on the line. Its Smart Toy range has been diagnosed with a security vulnerability that could leak the owners' information to hackers, a security analyst has... Read more
5d
The News-Herald
Something new to worry about: Connected toy securityNEW YORK >> Your smartphone or tablet is most likely pretty secure — not perfec
Something new to worry about: Connected toy security
The News-Herald / Posted 5 days ago
NEW YORK >> Your smartphone or tablet is most likely pretty secure — not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it. The same can’t be said for any Internet-connected toys you... Read more
7 related stories
5d
Computer Business Review
5 major cyber security reports you must readGiven the ever changing nature of the cyber security industry, and the threats
5 major cyber security reports you must read
Computer Business Review / Posted 5 days ago
Given the ever changing nature of the cyber security industry, and the threats posed by attackers, researchers are constantly producing in depth reports that look into the evolving threat landscape. Here CBR rounds up some of the key findings of... Read more
5d
SiliconANGLE
There’s a hacker in there: security vulnerabilities found in Fisher Price, hereO GPS kids toysNew research from cybersecurity firm Rapid7, Inc. has discovered that two popul
There’s a hacker in there: security vulnerabilities found in Fisher Price, hereO GPS kids toys
SiliconANGLE / Posted 5 days ago
New research from cybersecurity firm Rapid7, Inc. has discovered that two popular devices aimed at children have shipped with security vulnerabilities that would allow the devices to be accessed by nefarious third parties. The research found that... Read more
2 related stories
5d
MyMotherLode.com
US to rework arms control rule on exporting hacker toolsFILE - In this April 22, 2015 file photo, a… AP News | 02/02/16 12:19 pm WASH
US to rework arms control rule on exporting hacker tools
MyMotherLode.com / Posted 5 days ago
FILE - In this April 22, 2015 file photo, a… AP News | 02/02/16 12:19 pm WASHINGTON (AP) -- The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it... Read more
11 related stories
5d
WWLP Springfield
U.S. to rework arms control rule on exporting hacker toolsWASHINGTON (AP) — The U.S. government is rewriting a proposal under arms contro
U.S. to rework arms control rule on exporting hacker tools
WWLP Springfield / Posted 5 days ago
WASHINGTON (AP) — The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to hacking and surveillance software since they are also used to secure computer networks. The White... Read more
11 related stories
5d
PhysOrg
US to rework arms control rule on exporting hacker toolsIn this April 22, 2015 file photo, a presentation is made in the Symantec booth
US to rework arms control rule on exporting hacker tools
PhysOrg / Posted 5 days ago
In this April 22, 2015 file photo, a presentation is made in the Symantec booth during the RSA Conference in San Francisco. The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools... Read more
11 related stories
5d
The San Angelo Standard-Times
US to rework arms control rule on exporting hacker toolsWASHINGTON (AP) - The U.S. government is rewriting a proposal under arms contro
US to rework arms control rule on exporting hacker tools
The San Angelo Standard-Times / Posted 5 days ago
WASHINGTON (AP) - The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to hacking and surveillance software since they are also used to secure computer networks. The White... Read more
11 related stories
5d
Contra Costa Times Newspapers
Something new to worry about: Security of your kids' connected toysNEW YORK -- Your smartphone or tablet is most likely pretty secure -- not perfe
Something new to worry about: Security of your kids' connected toys
Contra Costa Times Newspapers / Posted 5 days ago
NEW YORK -- Your smartphone or tablet is most likely pretty secure -- not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it. The same can't be said for any Internet-connected toys you... Read more
7 related stories
5d
Your Hometown Lima Stations
US to rework arms control rule on exporting hacker toolsWASHINGTON (AP) - The U.S. government is rewriting a proposal under arms contro
US to rework arms control rule on exporting hacker tools
Your Hometown Lima Stations / Posted 5 days ago
WASHINGTON (AP) - The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to hacking and surveillance software since they are also used to secure computer networks. The White... Read more
11 related stories
5d
WFTV 9 Orlando
US to rework arms control rule on exporting hacker toolsWASHINGTON (AP) — The U.S. government is rewriting a proposal under arms contro
US to rework arms control rule on exporting hacker tools
WFTV 9 Orlando / Posted 5 days ago
WASHINGTON (AP) — The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to hacking and surveillance software since they are also used to secure computer networks. The White... Read more
11 related stories
5d
ABC 7 Gulfshore News
US to rework arms control rule on exporting hacker toolsWASHINGTON (AP) - The U.S. government is rewriting a proposal under arms contro
US to rework arms control rule on exporting hacker tools
ABC 7 Gulfshore News / Posted 5 days ago
WASHINGTON (AP) - The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to hacking and surveillance software since they are also used to secure computer networks. The White... Read more
11 related stories
5d
The Fremont Argus
Something new to worry about: Security of your kids' connected toysNEW YORK -- Your smartphone or tablet is most likely pretty secure -- not perfe
Something new to worry about: Security of your kids' connected toys
The Fremont Argus / Posted 5 days ago
NEW YORK -- Your smartphone or tablet is most likely pretty secure -- not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it. The same can't be said for any Internet-connected toys you... Read more
7 related stories
5d
The News & Observer
US to rework arms control rule on exporting hacker tools | News & Observer February 2, 2016 11:56 AM FILE - In this April 22, 2015
US to rework arms control rule on exporting hacker tools
The News & Observer / Posted 5 days ago
| News & Observer February 2, 2016 11:56 AM FILE - In this April 22, 2015 file photo, a presentation is made in the Symantec booth... Read more
11 related stories
5d
WBOC Salisbury
US to rework arms control rule on exporting hacker toolsWASHINGTON (AP) - The U.S. government is rewriting a proposal under arms contro
US to rework arms control rule on exporting hacker tools
WBOC Salisbury / Posted 5 days ago
WASHINGTON (AP) - The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to hacking and surveillance software since they are also used to secure computer networks. The White... Read more
11 related stories
5d
WLOX-TV Biloxi
US to rework arms control rule on exporting hacker toolsWASHINGTON (AP) - The U.S. government is rewriting a proposal under arms contro
US to rework arms control rule on exporting hacker tools
WLOX-TV Biloxi / Posted 5 days ago
WASHINGTON (AP) - The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to hacking and surveillance software since they are also used to secure computer networks. The White... Read more
11 related stories
5d
WAND TV 17 Decatur
US to rework arms control rule on exporting hacker toolsWASHINGTON (AP) - The U.S. government is rewriting a proposal under arms contro
US to rework arms control rule on exporting hacker tools
WAND TV 17 Decatur / Posted 5 days ago
WASHINGTON (AP) - The U.S. government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to hacking and surveillance software since they are also used to secure computer networks. The White... Read more
11 related stories
5d
Silicon Valley
Something new to worry about: Security of your kids' connected toysNEW YORK -- Your smartphone or tablet is most likely pretty secure -- not perfe
Something new to worry about: Security of your kids' connected toys
Silicon Valley / Posted 5 days ago
NEW YORK -- Your smartphone or tablet is most likely pretty secure -- not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it. The same can't be said for any Internet-connected toys you... Read more
7 related stories
6d
The Philippine Inquirer
Fisher-Price Smart Toy API flaw left kids' data open to hackersTOY MAKER Fisher-Price has found itself at the heart of a grizzly security situ
Fisher-Price Smart Toy API flaw left kids' data open to hackers
The Philippine Inquirer / Posted 6 days ago
TOY MAKER Fisher-Price has found itself at the heart of a grizzly security situation after it was revealed that the firm's Smart Toy bear was leaking data on customers and kids. Boston-based security outfit Rapid7 uncovered the flaw in the Smart Toy... Read more
2 related stories
6d
San Antonio Express-News
Something new to worry about: Connected toy securityNEW YORK (AP) — Your smartphone or tablet is most likely pretty secure — not pe
Something new to worry about: Connected toy security
San Antonio Express-News / Posted 6 days ago
NEW YORK (AP) — Your smartphone or tablet is most likely pretty secure — not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it. The same can't be said for any Internet-connected toys... Read more
7 related stories
6d
Daily Herald
Something new to worry about: Connected toy securityNEW YORK -- Your smartphone or tablet is most likely pretty secure - not perfec
Something new to worry about: Connected toy security
Daily Herald / Posted 6 days ago
NEW YORK -- Your smartphone or tablet is most likely pretty secure - not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it. The same can't be said for any Internet connected toys you... Read more
7 related stories
13d
WKYC Cleveland
This is why Twitter has 412 years to fix itselfTwitter's (TWTR) stock is crashing. Management is in upheaval. But the micro bl
This is why Twitter has 412 years to fix itself
WKYC Cleveland / Posted 13 days ago
Twitter's (TWTR) stock is crashing. Management is in upheaval. But the micro blogging site has one giant thing going for it - $3.5 billion in cash - which buys it lots of time. Shares of Twitter are down 65 cents, or 3.6%, to $17.19 Monday after CEO... Read more
20d
Computer World Australia
Advantech industrial serial-Internet gateways wide open to unauthorized accessInternet-connected industrial devices could be accessible to anyone, with no pa
Advantech industrial serial-Internet gateways wide open to unauthorized access
Computer World Australia / Posted 20 days ago
Internet-connected industrial devices could be accessible to anyone, with no password, thanks to a coding error by a gateway manufacturer. Taiwanese firm Advantech patched the firmware in some of its serial-to-IP gateway devices in October to remove... Read more
25d
techcentral.ie
Most companies can’t detect compromised credentialsSurvey finds in incident detection and response, nearly two thirds cannot detec
Most companies can’t detect compromised credentials
techcentral.ie / Posted 25 days ago
Survey finds in incident detection and response, nearly two thirds cannot detect credentials that have been compromised Nearly two thirds (60%) of companies cannot detect compromised credentials, according to Rapid7’s incident detection and response... Read more
27d
Arkansas Democrat-Gazette
Next gotta-have gadgetsLAS VEGAS -- Look around. How many computerized devices do you see? Your phone,
Next gotta-have gadgets
Arkansas Democrat-Gazette / Posted 27 days ago
LAS VEGAS -- Look around. How many computerized devices do you see? Your phone, probably; maybe a tablet or a laptop. Your car, the TV set, the microwave, bedside alarm clock, possibly the thermostat, and others you've never noticed. Much of that... Read more

People in this news