Please turn on your JavaScript for this page to function normally.
Bluetooth mesh
Bluetooth now supports mesh networking, ideally suited for building automation

The Bluetooth Special Interest Group (SIG) announced today that Bluetooth technology now supports mesh networking. The new mesh capability enables many-to-many (m:m) device …

SambaCry
Attackers are taking over NAS devices via SambaCry flaw

A Samba remote code execution flaw patched in May is being exploited to compromise IoT devices running on different architectures (MIPS, ARM, PowerPC, etc.), Trend Micro …

USA flag
US data breaches surge, businesses and healthcare organizations hit hardest

The number of US data breaches tracked through June 30, 2017 hit a half-year record high of 791, according to recent numbers released by the Identity Theft Resource Center …

toy
Think twice before buying a smart toy for your child

For a while now, security researchers have been warning about the security and privacy dangers of many popular “smart” toys. While consumer protection …

cloud binary
Dow Jones customer data exposed due to cloud misconfiguration

US-based publishing and financial information firm Dow Jones & Company is the latest casualty of a cloud database misconfiguration error. In late May, UpGuard’s …

DEF CON 25
Decrypting DEF CON badge challenges

Every summer, tens of thousands of hackers and information security enthusiasts make a journey to the Last Vegas strip for the Black Hat and DEF CON security conferences. …

idea
AI technologies will be in almost every new software product by 2020

Market hype and growing interest in artificial intelligence (AI) are pushing established software vendors to introduce AI into their product strategy, creating considerable …

Full Stack Web Performance
eBook: Full Stack Web Performance

Full Stack Web Performance is written for anyone grappling with the challenges of performance in a DevOps environment. Whether you’re a web developer, a DevOps engineer, an …

Android malware
Android backdoor GhostCtrl can do many unusual things

There is no shortage of Android malware, but it’s not often that one encounters an Android threat that can do as much as the GhostCtrl backdoor. According to Trend Micro …

airport security
US Border Patrol isn’t allowed to search travelers’ data stored in the cloud

When searching travelers’ mobile phones at the border, US Customs and Border Protection (CBP) officers do not have the authority to rifle through data stored solely on …

macOS High Sierra
The future of macOS security: Baked-in protection and third-party tools

Anyone in the information security industry who’s interested in Mac security probably knows who Patrick Wardle is. Apart from being Chief Security Researcher at Synack, …

London
A UK business will spend more than £1m recovering from a data breach

A UK business would have to spend £1.1m on average to recover from a breach – more than the global average of £1m. An NTT Security study of 1,350 non-IT business decision …

Don't miss

Cybersecurity news