65 vendors affected by severe vulnerabilities in Realtek chips
A vulnerability within the Realtek RTL819xD module allows attackers to gain complete access to the device, installed operating systems and other network devices. The chips …
How can secure KVM technology help eliminate security risks?
John Minasyan leads Belkin’s cybersecurity business unit focused on solutions to mitigate advanced threats at an operator’s desk. In this conversation with Help Net Security, …
Belkin’s secure KVMs achieves NIAP Protection Profile 4.0 certification
Belkin announced that its latest generation secure KVMs have been certified for the National Information Assurance Partnership (NIAP) Protection Profile for PSD 4.0 standard. …
Belkin unveils Secure KVMs portfolio designed for NIAP protection Profile 4.0 compliance
Belkin announces an entirely new portfolio of Secure KVMs designed for National Information Assurance Partnership (NIAP) Protection Profile 4.0 compliance. Belkin’s portfolio …
Regularly updating your wireless router is not enough to ward off attacks
Wireless routers are the most often attacked and exploited type of IoT device. They are also one of the rare IoT devices that most of us can’t do without. We need them …
Hacking smart plugs to enter business networks
McAfee researchers have discovered a buffer overflow flaw in Belkin’s Wemo Insight Smart Plug that can be exploited by attackers to access and interfere with other …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader