Please turn on your JavaScript for this page to function normally.
Icarus
Icarus takes control of drones by impersonating their operators

Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a …

Dyn
Dyn DDoS attack post-mortem: Users inadvertently helped

As StarHub, one of the three major telcos in Singapore, confirmed that they were the latest victim of “intentional and likely malicious distributed denial-of-service …

iPhone business
Malicious JPEGs can compromise your iPhone

A vulnerability in the iOS CoreGraphics component allows attackers to compromise iDevices by tricking victims into viewing a maliciously crafted JPEG file. The good news is …

blocks
Banks are building a real-time global payment network using blockchain technology

Nine out of 10 banking professionals surveyed at large US, European and Canadian commercial banks said their company is currently exploring the use of blockchain technology …

IoT world
Common enterprise IoT devices are hackable in minutes

Common enterprise IoT devices pose an inherent risk to the overall security posture of organisations, according to ForeScout Technologies. Smart video conference systems “IoT …

healthcare
Stolen medical records available for sale from $0.03 per record

The development of the market for stolen data and related hacking skills indicate that the business of cybercrime in the healthcare sector is growing, according to Intel …

person
88% of employees lack awareness to stop privacy or security incidents

The results of a new survey testing employee data privacy and cybersecurity knowledge reveal that 88 percent lack the awareness to stop preventable cyber incidents. MediaPro …

Unidirectional CloudConnect
Enabling the Industrial Internet of Things with Unidirectional CloudConnect

Waterfall Security Solutions launched Unidirectional CloudConnect, a solution based on its patented Unidirectional Gateway technology, designed to meet the challenges of both …

match
Terabit-scale DDoS events are on the horizon

Corero Network Security has disclosed a new DDoS attack vector observed for the first time against its customers last week. The technique is an amplification attack, which …

Report: The changing face of hacking
Over one-third of Americans have been hacked

Two-thirds of Americans believe themselves to be tech savvy, although their actions with regard to online security indicate otherwise – with millennials being the worst …

Intellectual property cyber theft to rise 58%

The number of intellectual property cyber theft incidents in the next 12 months is expected to increase, according to 58 percent of respondents to a recent Deloitte poll. When …

BYOD
61% of employers have no BYOD policy

Trustlook has shared findings on the latest BYOD trends and best practices from a survey of 320 Android users. “Some findings validated existing beliefs, while others were …

Don't miss

Cybersecurity news