Please turn on your JavaScript for this page to function normally.
IoT
New defense method enables telecoms, ISPs to protect consumer IoT devices

Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) and National …

remote work
Microsoft releases new encryption, data security enterprise tools

Microsoft has released (in public preview) several new enterprise security offerings to help companies meet the challenges of remote work. Double Key Encryption for Microsoft …

network
Internet security is improving, but exposures still run rampant

Rapid7’s research found that the security of the internet overall is improving. The number of insecure services such as SMB, Telnet, rsync, and the core email protocols, …

Ripple
Zero-day flaws in widespread TCP/IP library open millions of IoT devices to remote attack

19 vulnerabilities – some of them allowing remote code execution – have been discovered in a TCP/IP stack/library used in hundreds of millions of IoT and OT …

talk
A worrisome increase in call traffic from fraudsters exploiting the pandemic

There’s a worrisome increase in call traffic from bad actors looking to cash in on new vulnerabilities created by the global COVID-19 pandemic, according to research …

Crowdstrike
A massive increase in eCrime behavior can easily disrupt business operations

During 2019, financially motivated cybercrime activity occurred on a nearly continuous basis, according to a CrowdStrike report. There was an increase in incidents of …

mobile
Mobile data roaming traffic generated by consumer and IoT devices expected to surge

Mobile data roaming traffic generated by consumer and IoT devices reached 737 Petabytes in 2019, according to Kaleido Intelligence. This is forecast to reach 2,000 Petabytes …

DevOps
How industries are evolving their DevOps and security practices

There’s significant variation in DevOps maturation and security integration across the financial services, government, retail, telecom, and technology industries, …

email
Spam over phone and email is changing consumer communication preferences

Of today’s main communications mediums – text, phone calls and email – consumers get the most spam over phone and email: 70% said they receive spam often over email and 51% …

DNSSEC
DNSSEC still fueling DNS amplification attacks, TCP SYN flood attacks rise

DNS amplification attacks continue to increase in number, growing 4,788% over Q3 2018, according to Nexusguard. DNSSEC (Domain Name System Security Extensions) remains the …

5G
Redefining security KPIs for 5G service providers

Telco security professionals are missing the mark when understanding their consumers’ priorities, according to KPMG’s recent report. In the wake of a security breach, …

Search
Examining security process maturity in 400 organizations

There’s an overall failure in maturity of security processes of over 400 organizations in industries ranging from e-commerce, retail and payment processor to …

Don't miss

Cybersecurity news