Please turn on your JavaScript for this page to function normally.
BYOD
Employees rely largely on personally owned mobile devices in the workplace

Mobile device adoption in the workplace is not yet mature, found a recent survey from Gartner. Although 80 percent of workers surveyed received one or more corporate-issued …

Fingbox
Fingbox: Network security and Wi-Fi troubleshooting

Fingbox allows you to secure and troubleshoot your home network. It plugs in to your existing router, alerting you when it senses anything out of the ordinary – from new …

gear
New infosec products of the week​: November 25, 2016

Anomali STAXX: Easy way to subscribe to any STIX/TAXII feed Anomali, provider of threat intelligence platforms, today announced the availability of Anomali STAXX, a free …

iStorage diskAshur Pro
Review: iStorage diskAshur Pro SSD

The iStorage diskAshur Pro SSD is the hard drive for users with security on their mind. This USB 3.0 device comes in various storage capacities, ranging from 128GB to 1TB, and …

CPU
Researchers set to work on malware-detecting CPUs

Adding hardware protections to software ones to block the ever-increasing onslaught of computer malware seems like a solid idea, and a group of researchers have just been …

voting machine vulnerabilities
Exposing voting machine vulnerabilities

Cylance announced the successful exploitation of critical vulnerabilities in a common model of voting machine. The exploitation of these vulnerabilities was previously thought …

Cisco
Cisco plugs critical hole in Prime Home management platform

Cisco has released nine security alerts on Wednesday, and among these are two for critical vulnerabilities in its ASR 900 Series routers and the Cisco Prime Home management …

Icarus
Icarus takes control of drones by impersonating their operators

Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …

IoT world
Common enterprise IoT devices are hackable in minutes

Common enterprise IoT devices pose an inherent risk to the overall security posture of organisations, according to ForeScout Technologies. Smart video conference systems “IoT …

Unidirectional CloudConnect
Enabling the Industrial Internet of Things with Unidirectional CloudConnect

Waterfall Security Solutions launched Unidirectional CloudConnect, a solution based on its patented Unidirectional Gateway technology, designed to meet the challenges of both …

Intel CPU
Researchers bypass ASLR by exploiting flaw in Intel chip

Researchers have found a design flaw in the branch predictor, a component of Intel’s Haswell processor, and have exploited it to bypass ASLR (Address Space Layout …

medical money
Securing medical devices: Cybersecurity spending to triple by 2021

The medical IoT is set to transform healthcare through smart medical devices. However, their success is in jeopardy if cybersecurity concerns are not addressed immediately.

Don't miss

Cybersecurity news