Please turn on your JavaScript for this page to function normally.
Search
Monitoring scanning activities that could lead to IoT compromises

IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …

IoT
8.4 billion connected things will be in use worldwide in 2017

Gartner forecasts that 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. Total spending on endpoints …

The Internet of Risky Things
Review: The Internet of Risky Things

About the author Professor Sean Smith is the Principal Investigator of the Dartmouth Trust Lab and Director of Dartmouth’s Institute for Security, Technology, and …

car swerving hacking
Don’t take your hands off the wheel

Let me tell you a story. It’s a story about my brother-in-law, whom, for the sake of decency, we’ll call Steve. Steve has a new car. He loves that new car. It’s great. Does …

fire
Increasingly sophisticated attacks call for advanced protection tools

A new NTT Security report underscores the need for more advanced tools to protect organizations’ data and networks from the evolving tactics, techniques and procedures (TTPs) …

transformation
Connected homes and new hacking risks

Eight out of ten US consumers have a home data network and more than a third of them connect entertainment systems, gaming consoles and other smart devices to the Internet, …

robot
Five emerging technology trends essential to business success

People hold the power to shape and apply technology to create positive change, improve lives, and transform business and society, according to Accenture Technology Vision …

DDoS
Innovation and exploitation fuel DDoS attack landscape

Arbor Networks released its 12th Annual Worldwide Infrastructure Security Report offering direct insights from network and security professionals at global service providers, …

Market
IoT MSSPs market revenues to top $11 billion in 2021

Industrial applications are set to be the core focus for IoT Managed Security Service Providers (MSSPs) with ABI Research forecasting overall market revenues to increase …

world
Family dynamics in a connected world

A new global study by Intel Security aims to better comprehend how families’ attitudes and habits are evolving as their homes and lifestyles become increasingly connected. …

signature
Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!

A new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by Ben-Gurion University …

lights
Growing risk associated with mobile and IoT application security

Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research …

Don't miss

Cybersecurity news