Please turn on your JavaScript for this page to function normally.
Millions of smartphones, IoT devices risk compromise due to 3-year-old bug

Can you believe that an estimated 6.1 million smart phones, routers, and smart TVs are vulnerable to remote code execution attacks due to security bugs that have been fixed …

Cybercriminals to target new payment technologies

The year 2015 has become widely referred to as the year of the data breach. What nefarious cyber-acts will define 2016? Raytheon|Websense cybersecurity experts today shared …

Flaws in medical data management system can be exploited to modify patient information

Two vulnerabilities found in v3.3 of Epiphany’s Cardio Server ECG Management System, a popular system that is used to centralize and manage patient data by healthcare …

Securing the smart home environment

Currently, smart home environments complement traditional home appliances with connected devices that collect, exchange and process data to create added-value services and …

Five big technology predictions into 2016

1. Security will be the biggest issue in the ICT industry driven by rapid adoption of Cloud, Mobility and the Internet of Things As platforms become more open due to the rapid …

IoT attacks and evasion techniques will characterize threats in 2016

As in years past, the Internet of Things and cloud play heavily in the predictions but new malicious tactics and strategies will create unique challenges for vendors and …

Guidelines for smart city technology adoption

Securing Smart Cities, the not-for-profit global initiative addressing the cyber security challenges of smart cities, released guidelines jointly developed by Securing Smart …

9271 crucial vulnerabilities found in 185 firmware images of embedded devices

A study into the security of the Internet of Things has confirmed that the web interfaces for user administration of commercial, off-the-shelf embedded devices – …

BadBarcode: Poisoned barcodes can be used to take over systems

Researchers from Tencent’s Xuanwu Lab have proved that a specially crafted barcode can be used to execute commands on a target system, saddle it with malware, or perform …

Researchers hack Vizio Smart TVs to access home network

Not only do Vizio’s Smart TVs track users’ viewing habits by default (and that information is sold to third parties who can then use it to deliver targeted ads to …

6.4 billion connected things will be in use in 2016

Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new …

The transformative technology security nightmare

They say that every silver lining comes with a cloud attached and that’s certainly true of today’s transformative technologies. CEOs and the board rightly see BYOD, Cloud and …

Don't miss

Cybersecurity news