F-Secure
New infosec products of the week: February 7, 2020
USB armory Mk II: A secure computer on a USB stick featuring open source hardware design The USB armory Mk II’s security features include internal and external cryptographic …
USB armory Mk II: A secure computer on a USB stick featuring open source hardware design
The hardware security professionals at F-Secure have created a new version of the USB armory – a computer on a USB stick built from the ground up to be secure. USB armory Mk …
Major vulnerabilities found in popular wireless presentation system
F-Secure consultants have discovered several exploitable vulnerabilities in Barco’s ClickShare wireless presentation system. Attackers can use the flaws to intercept and …
Unpatchable KeyWe smart lock can be easily picked
A design flaw in the KeyWe smart lock (GKW-2000D), which is mostly used for remote-controlled entry to private residences, can be exploited by attackers to gain access to the …
As the online shopping season begins, consumers worry about cybercrime
A majority of U.S. consumers plan to do most of their holiday shopping online for the first time ever, yet a survey from F-Secure finds that most internet users remain …
F-Secure integrates its cyber security software into Zyxel’s residential gateways and devices
Zyxel Communications, a leading provider of secure broadband networking, Internet access and connected home products, announced it has teamed up with F-Secure to integrate the …
Exploitation of IoT devices and Windows SMB attacks continue to escalate
Cybercriminals upped the intensity of IoT and SMB-related attacks in the first half of 2019, according to a new F-Secure report. The report underscores the threats IoT devices …
Security flaw could turn load balancers into beachheads for cyber attacks
Cyber security provider F-Secure is advising organizations using F5 Networks’ BIG-IP load balancer, which is popular amongst governments, banks, and other large corporations, …
How can attackers abuse artificial intelligence?
Artificial intelligence (AI) is rapidly finding applications in nearly every walk of life. Self-driving cars, social media networks, cybersecurity companies, and everything in …
Many are seeing the damage of cybercrime and identity theft firsthand
As massive data breaches continue to make international headlines and the Internet is an integral part of our daily lives, consumers are now grasping the risks they face. In a …
Cyber espionage and sabotage attacks pose an increasing threat to the energy industry
Malicious actors are targeting critical infrastructure (CNI) sites and energy distribution facilities exponentially. Interconnected systems in the energy industry increase …
Securing your home increasingly means securing all of your IoT devices
The Internet of Things explosion has proven controversial due to the insufficient security measures in many of these internet-connected devices. IoT attacks increase And a new …