65 vendors affected by severe vulnerabilities in Realtek chips
A vulnerability within the Realtek RTL819xD module allows attackers to gain complete access to the device, installed operating systems and other network devices. The chips …
How can secure KVM technology help eliminate security risks?
John Minasyan leads Belkin’s cybersecurity business unit focused on solutions to mitigate advanced threats at an operator’s desk. In this conversation with Help Net Security, …
Belkin’s secure KVMs achieves NIAP Protection Profile 4.0 certification
Belkin announced that its latest generation secure KVMs have been certified for the National Information Assurance Partnership (NIAP) Protection Profile for PSD 4.0 standard. …
Belkin unveils Secure KVMs portfolio designed for NIAP protection Profile 4.0 compliance
Belkin announces an entirely new portfolio of Secure KVMs designed for National Information Assurance Partnership (NIAP) Protection Profile 4.0 compliance. Belkin’s portfolio …
Regularly updating your wireless router is not enough to ward off attacks
Wireless routers are the most often attacked and exploited type of IoT device. They are also one of the rare IoT devices that most of us can’t do without. We need them …
Hacking smart plugs to enter business networks
McAfee researchers have discovered a buffer overflow flaw in Belkin’s Wemo Insight Smart Plug that can be exploited by attackers to access and interfere with other …
Featured news
Resources
Don't miss
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk