Please turn on your JavaScript for this page to function normally.
open source
Companies turn a blind eye to open source risk

Though open source software (OSS) helps software suppliers be nimble and build products faster, there are hidden software supply chain risks all software suppliers and IoT …

DDoS
DDoS attacks: Brands have plenty to lose, even if attacked only once

DDoS attacks continue to be an effective means to distract and confuse security teams while inflicting serious damage on brands. Neustar discovered that brands experienced a …

energy
Outsmarting grid security threats

Almost two-thirds (63 percent) of utility executives believe their country faces at least a moderate risk of electricity supply interruption from a cyberattack on electric …

keys
PKI changes and uncertainty due to new applications

New research by the Ponemon Institute reveals the Internet of Things (IoT) is playing an increasingly important role in influencing public key infrastructure (PKI) planning …

vectors
Three out of four DDoS attacks target multiple vectors

Three out of every four DDoS attacks employed blended, multi-vector approaches in the second quarter of 2017, according to Nexusguard. Distribution of DDoS attack vectors The …

modem router
Is your router sending out spam?

A Linux Trojan that has been infecting IoT devices for half a year and made them run a SOCKS proxy server has now acquired spam-sending capabilities. About Linux.ProxyM Doctor …

Trusted IoT
Setting the standard for a blockchain protocol for IoT

A wide range of blockchain technology companies and enterprises like Cisco, Gemalto and Bosch have launched the Trusted IoT Alliance, an initiative that aims to bring …

abstract
Digital future: Are we ready for what’s next?

The Internet Society (ISOC), a global non-profit dedicated to ensuring the open development, evolution and use of the Internet, released “Paths to our Digital …

map
Addressing security concerns around connected ecosystems

The convergence of IoT applications with emerging technologies such as artificial intelligence, Big Data, and context-aware computing could help address current security …

healthcare
Syringe infusion pumps can be fiddled with by remote attackers

A syringe infusion pump used in acute care settings sports eight vulnerabilities, some of which could be exploited by remote attackers to impact the intended operation of the …

IoT
13% of SMBs have experienced an IoT-based attack

One in four companies have already experienced a ransomware attack and one in eight have dealt with an IoT-based attack, according to Arctic Wolf Networks. As mid-market …

Axonius platform
Axonius announces $4M seed round to secure the explosion of connected devices

Israeli startup Axonius today announced $4 million in seed funding for its mission to secure and manage the growing billions of connected devices in use by businesses. Backing …

Don't miss

Cybersecurity news