Secure IT: Profile of a White Hat hacker

Ever wondered who these ‘hush-hush’ people are that help to keep our networks safe? Here we talk to Lawrence Munro, director of SpiderLabs EMEA for Trustwave, about the role of the ‘White Hat hacker’.

Read more

Mocana raises $11m new funding to defend IoT devices and industrial control systems

Mocana Corporation, a provider of mission-critical IoT security solutions for industrial control systems and the Internet of Things, announced that the company has received $11 million in additional investment from Sway Ventures, Shasta Ventures, Trident Capital Fund and GE Ventures.

Read more

DDoS via the Internet of Things – the first wave of attacks?

In the last year, we’ve all heard of the Mirai malware, but did you know that Mirai is Japanese for ‘the future’? And that’s what I believe we are seeing: The future of cyber-attacks.

Read more

IoT-enabled products bring risks as well as benefits, warns Stericycle

In 2016 there were approximately 17.68 billion connected devices globally and predictions suggest that this could grow fourfold by 2025. However, according to the new Recall Industry Spotlight, released by Stericycle ExpertSOLUTIONS, these devices also come with potentially serious drawbacks.

Read more

Cyber criminals focusing attention on connected devices and the IoT, says a UK business ISP

UK businesses were, on average, subjected to almost 230,000 cyber attacks each during 2016, according to new analysis from Beaming, a provider of business internet service provider (ISP).

Read more

Floodgate IoT security toolkit for edge devices launched by Icon Labs

Icon Labs, a provider of security solutions for IoT and edge devices, has introduced its new Floodgate IoT Security Toolkit.

Read more

Why the Internet of Things is a can of worms and how to keep it sealed

Innocuous devices that the Internet of Things search engine Shodan recently found to be vulnerable to cyber attacks include a teddy bearable to remotely send voice messages and a doorbell with a video monitor that can be remotely accessed by a phone. Unchanged default passwords and poor app configuration were discovered as the most prominent

Read more