Please turn on your JavaScript for this page to function normally.
mobile
How to minimize the negative effect of mobile device loss or theft

Have you, like me, become inordinately obsessed with the security of your smartphone? And are you forever checking your pockets to make sure you haven’t left it behind …

healthcare
Hackers are finding creative ways to target connected medical devices

Hackers are leveraging error messages from connected medical devices — including radiology, X-ray and other imaging systems — to gain valuable insights, according to Zingbox. …

spray-on antenna
Researchers develop invisibly thin spray-on antennas

The promise of wearables, functional fabrics, the Internet of Things, and their “next-generation” technological cohort seems tantalizingly within reach. But …

chart
Security appliance market experiences year-over-year revenue growth

According to the IDC Worldwide Quarterly Security Appliance Tracker, the total security appliance market experienced positive unit shipment and revenue growth for the second …

Schneider Electric Modicon M221
Remotely exploitable flaw in Schneider Electric PLCs is a danger to OT networks

A vulnerability in the Schneider Electric Modicon M221, a programmable logic controller (PLC) deployed in commercial industrial facilities worldwide, can be exploited to …

3d printing
Access misconfiguration opens 3D printers to remote attacks

Spurred by a report coming from a regular reader, SANS ISC handlers Richard Porter and Xavier Mertens searched for OctoPrint interfaces for 3D printers exposed online and …

Philips health
Phillips plugs security flaws in e-Alert tool

Dutch tech company Phillips has fixed several serious security flaws in Philips e-Alert, a tool that helps magnetic resonance imaging (MRI) systems work as intended. About …

Datacaptor Terminal Server
Old “Misfortune Cookie” flaw opens medical gateway and devices to attack

A vulnerability in Qualcomm Life Capsule Datacaptor Terminal Server (DTS) can be easily exploited to allow attackers to execute unauthorized code to obtain administrator-level …

USB
23% of UK SMBs still use USB drives as their primary data storage solution

Mny British companies are finding it hard to store and manage their company’s data effectively. Seagate polled a representative sample of 1,006 UK SMB employees, asking them …

building
IoT security: The work on raising the bar continues

One of the main goals of Chief Information Security Officers should be to help the organization succeed, and they are unlikely to do that by denying their organization the …

laptop
Don’t sleep on laptop security, safeguard your data

For many of us, shutting our laptops after a tough day in the office is a satisfying feeling that signals the end of work until tomorrow. But what we don’t realise is that …

hybrid IT
Faster, simpler, smaller, smarter: A cybersecurity dream becomes reality

More ports, same space, faster speeds, simpler deployment, foolproof configuration, fully scalable and a smarter way to protect your network. Sounds like an IT professional’s …

Don't miss

Cybersecurity news