Please turn on your JavaScript for this page to function normally.
drone
Hacking robotic vehicles is easier than you might think

Robotic vehicles like Amazon delivery drones or Mars rovers can be hacked more easily than people may think, a research from the University of British Columbia suggests. …

IoT connection
Create secure IoT products: Enable security by design

Good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime have been introduced …

numbers
Inadequate data sanitization puts enterprises at risk of breaches and compliance failures

Global enterprises’ overconfidence and inadequate data sanitization are exposing organizations to the risk of data breach, at a time when proper data management should be at …

Intel processor
Intel releases updates to plug TPM-FAIL flaws, foil ZombieLoad v2 attacks

Intel’s Patch Tuesday releases are rarely so salient as those pushed out this month: the semiconductor chip manufacturer has patched a slew of high-profile …

Cisco
Cisco fixes small business routers, kills eavesdropping vulnerability in conferencing devices

Cisco has released security updates for a variety of its products – owners of Small Business RV Series Routers, Web Security Appliances and TelePresence devices should …

mountain connect
IoT is an ecosystem, as secure as its weakest link

Remember when, three years ago, several Mirai botnets hit DNS provider Dyn and caused part of the Internet to be unreachable for most users in North America and Europe? For a …

wireless
New protocol extends Wi-Fi range, can be used with existing hardware

A protocol that significantly extends the distance a Wi-Fi-enabled device can send and receive signals has been created by a group of researchers led by a Brigham Young …

IoT
Integrating security into IoT projects is not easy, but it’s increasingly urgent

With an installed base of 44 billion connected devices projected for 2023, the amount of data and information generated and shared will reach zettabytes of data, according to …

money
Spending on security hardware, software, and services continues to increase

Worldwide spending on security products and services will enjoy solid growth over the next five years as organizations continue to invest in solutions to meet a wide range of …

connected car
As car manufacturers focus on connectivity, hackers begin to exploit flaws

Car manufacturers offer more software features to consumers than ever before, and increasingly popular autonomous vehicles that require integrated software introduce security …

industrial
Microsegmentation for refining safety systems

When the TRITON (aka TRISIS) attack struck three refining sites in the Middle East in November of 2017, it was the first known cyber incident to target safety instrumented …

IoT
New data analysis approach could strengthen the security of IoT devices

A multi-pronged data analysis approach that can strengthen the security of IoT devices, such as smart TVs, home video cameras and baby monitors, against current risks and …

Don't miss

Cybersecurity news