Please turn on your JavaScript for this page to function normally.
email
Email and IoT security issues persist

New AT&T research shows many businesses are not effectively protecting their data. As more organizations adopt cloud architectures, traditional security protections …

IoT
How can we build a secure IoT world?

We have almost daily proof that the Internet of Things, as it is now, is a minefield of security issues that are just waiting to be exploited. The unfortunate reality is that …

brain
CloudPets connected toys can be turned into remote surveillance devices

The CloudPets data breach saga continues, as Spiral Toys finally reported the breach to the California Attorney General’s Office. As a reminder: Leaked data provided to …

hole
Millions of smart devices in Spain are vulnerable to attack

Avast revealed the findings of its research experiment into smart devices, including public and private webcam vulnerabilities in Spain, and, specifically, in Barcelona. Avast …

mobile device
500,000+ devices have dangerous apps installed

At Mobile World Congress (MWC) 2017, connected cars, the future of smart homes and, of course, the newest handsets are top of the agenda. Intel Security’s latest findings show …

connections
How IoT initiatives impact the IT infrastructure

Internet of Things (IoT) infrastructure spending is making inroads into enterprise IT budgets across a diverse set of industry verticals. Improved business offerings, IoT data …

connected
Biggest limiting factors to universal adoption of connected devices

After surveying 250 respondents at CES 2017, the Open Connectivity Foundation (OCF) concluded that more than 60 percent of respondents consider standardization and …

danger
Advanced Windows botnet spreads Mirai malware

Kaspersky Lab experts are analyzing the first Windows-based spreader for the Mirai malware as part of a concerted effort to close down Mirai botnets in the wild. The Windows …

samas-ransomware
How to leverage intelligent deception to detect cyber attacks

Perimeters are fading, and attackers find it easier and easier to penetrate organizational networks. Organizational networks today are chaotic, they’re very dynamic, and this …

IoT
The dangers that come with buying pre-owned IoT devices

When you buy a second-hand connected car, can you be sure that it is not still not reachable by its former owner? Similarly, when you sell your own connected car, how can you …

blocks
Data-centric IoT security for Hadoop Big Data environments

Hewlett Packard Enterprise (HPE) introduced today at RSA Conference 2017 HPE SecureData for Hadoop and IoT, designed to easily secure sensitive information that is generated …

IoT
Security programs not keeping up with IoT threats

More than 90 percent of IT security professionals said that connected devices will be a major security issue this year. However, 66% aren’t sure how many devices are in their …

Don't miss

Cybersecurity news