Please turn on your JavaScript for this page to function normally.
chart
Security appliance market experiences year-over-year revenue growth

According to the IDC Worldwide Quarterly Security Appliance Tracker, the total security appliance market experienced positive unit shipment and revenue growth for the second …

Schneider Electric Modicon M221
Remotely exploitable flaw in Schneider Electric PLCs is a danger to OT networks

A vulnerability in the Schneider Electric Modicon M221, a programmable logic controller (PLC) deployed in commercial industrial facilities worldwide, can be exploited to …

3d printing
Access misconfiguration opens 3D printers to remote attacks

Spurred by a report coming from a regular reader, SANS ISC handlers Richard Porter and Xavier Mertens searched for OctoPrint interfaces for 3D printers exposed online and …

Philips health
Phillips plugs security flaws in e-Alert tool

Dutch tech company Phillips has fixed several serious security flaws in Philips e-Alert, a tool that helps magnetic resonance imaging (MRI) systems work as intended. About …

Datacaptor Terminal Server
Old “Misfortune Cookie” flaw opens medical gateway and devices to attack

A vulnerability in Qualcomm Life Capsule Datacaptor Terminal Server (DTS) can be easily exploited to allow attackers to execute unauthorized code to obtain administrator-level …

USB
23% of UK SMBs still use USB drives as their primary data storage solution

Mny British companies are finding it hard to store and manage their company’s data effectively. Seagate polled a representative sample of 1,006 UK SMB employees, asking them …

building
IoT security: The work on raising the bar continues

One of the main goals of Chief Information Security Officers should be to help the organization succeed, and they are unlikely to do that by denying their organization the …

laptop
Don’t sleep on laptop security, safeguard your data

For many of us, shutting our laptops after a tough day in the office is a satisfying feeling that signals the end of work until tomorrow. But what we don’t realise is that …

hybrid IT
Faster, simpler, smaller, smarter: A cybersecurity dream becomes reality

More ports, same space, faster speeds, simpler deployment, foolproof configuration, fully scalable and a smarter way to protect your network. Sounds like an IT professional’s …

3d printing
The security issues 3D printing should solve before going mainstream

It’s always fun when you can mix your personal hobbies and interests with your profession, and often the passion you carry for the things you love can lead to valuable and …

Samsung SmartHub
Samsung SmartThings Hub vulnerabilities allow attackers inside your home

Cisco Talos researchers have unearthed 20 vulnerabilities in the Samsung SmartThings Hub that could be leveraged by attackers to monitor, control and interfere with devices …

Google security
After extensive testing, Google introduces the Titan Security Key

Google recently shared that since it made employees use physical security keys instead of passwords and one-time codes, none of them – and there are over 85,000 – …

Don't miss

Cybersecurity news