![Trend Micro](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095418/trend_micro-diagram-400x200.jpg)
Radio frequency remote controller weaknesses have serious safety implications
Trend Micro released a new report detailing inherent flaws and new vulnerabilities in radio frequency (RF) remote controllers found and disclosed through the Zero Day …
![PremiSys](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095421/premisys-400x200.jpg)
Widely used building access system can be easily compromised
A researcher has discovered several egregious vulnerabilities in the PremiSys IDenticard building access management system, some of which could allow attackers to take control …
![Tesla interior](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110548/tesla-interior-400x200.jpg)
Hack a Tesla Model 3, get cash and the car
For this year’s edition of the Pwn2Own hacking contest at CanSecWest, Trend Micro’s Zero Day Initiative has announced a new target category: Automotive. So, aside from …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095907/industry-mirror-400x200.jpg)
A new taxonomy for SCADA attacks
Attacks aimed at SCADA networks are still much rarer than those targeting IT networks, but the number is slowly rising. And, according to Radiflow CTO Yehonatan Kfir, …
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095430/ciso-400x200.jpg)
How to build a better CISO
The technology industry has long been categorized by its ability to transform at the blink of an eye. If you think back 20 years, the internet was just picking up consumer …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
Criminals wielding Ryuk ransomware specialize in targeting enterprises
A cybercriminal group dubbed Grim Spider has been using the Ryuk ransomware to exclusively target enterprises and has managed to amass over 705 Bitcoins (around $3.7 million) …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100610/windows-400x200.jpg)
43% of businesses are still running Windows 7, security threats remain
With one year to go until Microsoft ends support for its ten-year-old operating system Windows 7, as many as 43% of enterprises are still running the outdated platform. …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095939/architecture-400x200.jpg)
90% of companies face significant obstacles with digital transformation
Nearly eight in 10 (79 percent) companies are in the process of digital transformation, but the vast majority, 90 percent, are facing significant obstacles to success. The new …
![binary bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112818/binary-bomb-400x200.jpg)
SmokeLoader malware downloader enters list of most wanted malware
Check Point has published its latest Global Threat Index for December 2018. The index reveals that SmokeLoader, a second-stage downloader known to researchers since 2011, rose …
![prison](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100503/prison-400x200.jpeg)
Hackers who DDoSed African telecom and US hospital get long prison sentences
Two men who launched DDoS attacks against a variety of targets have received substantial prison sentences on Friday. Attacks against Liberian telecom 30-year-old Daniel Kaye …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
Considering an SD-WAN deployment? The best solution may already be in your network
When the internet goes down, business stops. Every business today relies on cloud applications to run day-to-day operations, including CRM applications like Salesforce, …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095434/industrial-400x200.jpg)
Strategies for expertly protecting industrial control systems
Andrew Ginter is the Vice President of Industrial Security at Waterfall Security Solutions. We sat down with him to learn more about his new book, Secure Operations …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage