hardware
Apple releases security updates, says new MacBooks will disconnect microphone when lid is closed
Apple unveiled new Macs and iPads on Tuesday and has pushed out security updates for macOS (Mojave, High Sierra, Sierra), iOS, watchOS, tvOS, Safari, iTunes, and iCloud for …
IoT users uncertain if personal data is shared across multiple devices
Most people (64%) say they don’t depend on their connected devices to accomplish daily activities, nearly twice as many as the 36% who indicate they depend on their …
The risk to OT networks is real, and it’s dangerous for business leaders to ignore
Data from the new CyberX CyberX Global ICS & IIoT Risk Report shows major security gaps remain in key areas such as plain-text passwords, direct connections to the …
Global IT spending to reach $3.8 trillion in 2019
Worldwide IT spending is projected to total $3.8 trillion in 2019, an increase of 3.2 percent from expected spending of $3.7 trillion in 2018, according to the latest forecast …
Vulnerable controllers could allow attackers to manipulate marine diesel engines
Researchers have found several authentication and encryption vulnerabilities in the firmware of marine diesel engine controllers by Norwegian company Auto-Maskin, as well as …
The future of OT security in modern industrial operations
Both the likelihood and consequences of cyberattacks to OT/ICS components continue to grow for modern industrial operations. In this podcast, Andrew Ginter, VP of Industrial …
Global spending on security solutions to reach $133.7 billion in 2022
Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to IDC. Although spending growth is expected to …
Demand for smart security is on the rise
75% of UK consumers own a smart home device or are considering a purchase, according to Swann. They also reveal that 72% believe smart home technology could improve their …
Safe IT/OT integration with unidirectional security gateways
The reason SCADA security is so controversial stems primarily from the intense consequences that come from a compromise in this area. In this podcast, Andrew Ginter, VP of …
China allegedly infiltrated US companies through implanted hardware backdoors
Many US companies, including Amazon and Apple, have been the victims of a clever supply chain attack that resulted in compromised hardware (servers) being installed at some of …
Regularly updating your wireless router is not enough to ward off attacks
Wireless routers are the most often attacked and exploited type of IoT device. They are also one of the rare IoT devices that most of us can’t do without. We need them …
Popular TP-Link wireless home router open to remote hijacking
By concatenating a known improper authentication flaw with a newly discovered CSRF vulnerability, remote unauthenticated attackers can obtain full control over TP-Link …