Please turn on your JavaScript for this page to function normally.
IoT
Critical bug allows remote compromise, control of millions of IoT devices (CVE-2021-28372)

A vulnerability (CVE-2021-28372) in the SDK that allows IoT devices to use ThroughTek’s Kalay P2P cloud platform could be exploited to remotely compromise and control …

Realtek
65 vendors affected by severe vulnerabilities in Realtek chips

A vulnerability within the Realtek RTL819xD module allows attackers to gain complete access to the device, installed operating systems and other network devices. The chips …

IoT
A remedial approach to destructive IoT hacks

As of this year, there are more than 10 billion active IoT devices all over the world, many of which are deployed in enterprises. Keeping those devices secure is of the utmost …

network
Connected devices increasingly at risk as new ransomware attacks are reported almost daily

Ordr released a report on the state of connected devices. The 2021 study addresses pandemic-related cybersecurity challenges, including the growth of connected devices and …

ransomware
Ransomware attacks skyrocketed in H1 2021

In the first half (H1) of 2021, ransomware attacks skyrocketed, eclipsing the entire volume for 2020 in only six months, according to the mid-year update to the SonicWall …

Terminal
Ignore API security at your peril

Application programming interfaces (APIs) are at the core of nearly every digital experience – whether that is the delivery of mobile apps that enable consumers to …

brain
IoT ML and AI services to reach $3.6 billion in 2026

The next wave of Internet of Things (IoT) analytics development will fully converge with the big data domain. Simultaneously, the value in the technology stack is shifting …

alert
IoT malware attacks rose 700% during the pandemic

Zscaler released a study examining the state of IoT devices left on corporate networks during a time when businesses were forced to move to a remote working environment. The …

IoT
ETSI completes set of IoT MQTT and CoAP testing standards

The ETSI committee on Methods for Testing and Specifications (TC MTS) has recently completed a first set of seven standards addressing the testing of the IoT MQTT and CoAP …

architecture
Businesses relying on data to achieve post-pandemic digital transformation goals

Frost & Sullivan’s recent analysis finds that organizations worldwide are inclined to invest in hybrid and multi-cloud information technology (IT) environments that …

network
What drives SDN adoption?

U.S. enterprises are looking to software-defined networking (SDN) providers to help them increase their agility and flexibility and enable remote working after the COVID-19 …

tunnel
What you need to know about transatlantic data transfers

Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …

Don't miss

Cybersecurity news