Please turn on your JavaScript for this page to function normally.
chip
Algorithms can now find bugs in computer chips before they are made

In early 2018, cybersecurity researchers discovered two security flaws they said were present in almost every high-end processor made and used by major companies. UPEC product …

Mirai variant picks up new tricks, expands list of targeted devices

Mirai, the infamous malware that turns Linux-based IoT devices into remotely controlled bots, has been updated to target new devices and device types. Among these are LG …

DDoS
IoT devices using CoAP increasingly used in DDoS attacks

IoT devices in synchronised attacks on targets represent a growing part of global Distributed Denial of Service (DDoS) weapon arsenals. There is a significant potential for …

IoT automation platforms open smart buildings to new threats

IoT automation platforms in smart buildings are presenting attackers with new opportunities for both physical and data compromise, Trend Micro researchers warn in a newly …

reload
Organizations are seeing integration challenges hinder digital transformation initiatives

While 97 percent of organizations are currently undertaking or planning to undertake digital transformation initiatives, integration challenges are hindering efforts for 84 …

Netscout
Attackers continue to enhance their performance, apply smart business techniques

During the second half of 2018, attackers bulked up existing tactics, rapidly evolvied new performance enhancements, and applied smart business techniques to vastly accelerate …

IoT security
Researchers and businesses need to work together to expose IoT vulnerabilities

As the Internet of Things (IoT) grows and smart devices gain popularity, cybercriminals will continue to find new ways to exploit all connected things. Two new vulnerabilities …

touchscreen
Global mobile networks to support 12.3 billion devices and IoT connections by 2022

There has been a worldwide rise in mobile access for consumers and business users. The expanded reach and quality of mobile broadband has fostered a seemingly insatiable …

IoT
European standards org releases consumer IoT cybersecurity standard

The European Telecommunications Standards Institute (ETSI) has released ETSI TS 103 645, a standard for cybersecurity in the Internet of Things, to establish a security …

numbers
Adiantum: A new encryption scheme for low-end Android devices

Google has created an alternative disk and file encryption mode for low-end Android devices that don’t have enough computation power to use the Advanced Encryption …

802 Secure
The problem with vulnerable IoT companion apps

There’s no shortage of exploitable security holes in widely used Internet of Things devices, so it shouldn’t come as a surprise that the communication between many …

Blocks
5 reasons why asset management is a hot topic

Sometimes buzzwords are good predictors of what organizations see as priorities in a given year. If you surveyed both the revenue-generating and security functions of …

Don't miss

Cybersecurity news