Trending

Heat Index

Posts Tagged ‘cyber attack’

Most Recent
 
Read More
March 29, 2016

MWR InfoSecurity issues practical advice on building a secure LoRa solution

Speaking at The Symposium on Security for Asia Network (SyScan) in Singapore, Rob Miller, senior security consultant at MWR InfoSecurity, has detailed how to build LoRa systems that are provably secure against cyber-attack.

210
 
Read More
January 26, 2016

Vectra Networks shows how vulnerabilities in IoT devices can create backdoors for attacks

Vectra® Networks, reports that the Vectra Threat Labs™ has verified that consumer-grade Internet of Things (IoT) products, such as Wi-Fi security web cameras, can be hacked and reprogrammed to serve as permanent backdoors.

105
 
Read More
January 18, 2016

Vectra Networks shows how vulnerabilities in IoT devices can create backdoors for attacks

Vectra® Networks has announced that the Vectra Threat Labs™ has verified that consumer-grade Internet of Things (IoT) products, such as Wi-Fi security web cameras, can be hacked and reprogrammed to serve as permanent backdoors, enabling potential attackers to remotely command and control a cyber attack without being detected by traditional security products.

135
 
Read More
December 29, 2015

A look back at SCADA security in 2015

It should come as no surprise that Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) that control key functions in critical infrastructure are especially at risk of cyber attack. If saboteurs manage to compromise critical infrastructure services, a country’s economy and military defenses can be severely hampered.

160
 
Read More
October 2, 2014

Do IT security professionals have the tools and CxO support to prevent cyber-attacks on the IoT?

According to several IoT industry analysts, IT security professionals are not confident that they can prevent cyber-attacks on the Internet of Things. Not only do companies still need to get their data security houses in order, the market for data security products is frustratingly being described by one analyst firm as “immature”. Jeremy Cowan reports.

155
 
Read More
October 21, 2013

Top Wireless Gotchas! Number Three: Mitigating security risks

Blog — This is the third post in a multi-part series of blogs by Bill Zujewski, which specifically explores the challenges of dealing with wireless technology as part of an M2M (Machine-To-Machine) initiative. The series offers insights to help designers and developers prepare for and overcome the unique challenges involved with implementation. Today’s post focuses on security risks.

35
 
Read More
October 7, 2011

IBM to acquire Q1 Labs and build security intelligence

Armonk, New York, USA: IBM (NYSE: IBM) has agreed to acquire privately held Q1 Labs, a Waltham, Massachusetts-based provider of security intelligence software. The move aims to accelerate IBM’s efforts to secure its clients’ enterprises more intelligently by applying analytics

95

IoT LIFE LESSONS.

 
Read More
675

FEATURED VIDEOS

 
What are the greatest customer benefits of eSIMs? Quickfire Interview with Arm
 
 
 
 

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close