cybercriminals
Are IoT Devices the Achilles Heel of OT Systems?
When implementing cybersecurity measures, IT systems are often the first consideration. Historically, cybercriminals have made IT systems the focus of their attacks in the hopes of hijacking sensitive, private data to hold for ransom or utilise for other nefarious means. Operational technology (OT) systems, on the other hand, have long been considered inherently secure and
Read morePrioritising security as electric vehicle charging ramps up
As governments around the world instigate and progress sustainable transport policies and initiatives, the need for more electric vehicle (EV) charge points grows. The IoT underpins this relatively new infrastructure by enabling the exchange of operational and other data. To secure and protect this data and charging assets, charge point operators (CPOs) must design their
Read moreSequitur Labs foresees increased need for device security in 2022
Seattle – With significant growth projected in the global IoT market over the next 6 years, the need to subsequently secure devices at the edge from attacks, safe and secure through the manufacturing process, and managed securely throughout the life of the product will follow a similar trajectory, predict experts at Sequitur Labs.
Read moreOver 600,000 new malicious programs registered globally every day in 2021
Data acquired and calculated by Finbold projects that about 604,059 new malicious programs (malware) and potentially unwanted applications (PUA) are globally registered daily in 2021.
Read more5 challenges still facing the Internet of Things
The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.
Read moreWhy device security is up to the user
More devices mean more susceptible connections from server to receiver. While that might be a cynical view, it is a factual one. Smart doorbells with face recognition, pet tech with microphones, Teslas with cameras: devices are only becoming more widespread but, generally speaking, not improving when it comes to security.
Read moreHealthcare IT solutions company, Comport, discusses ways to protect hospitals from ransomware attacks
In response to the rising threat of ransomware in the healthcare industry, Comport, a cloud computing and Healthcare IT Solutions Company, held discussions with top healthcare CIO’s discussing ransomware protections that they may want to consider.
Read moreProtecting Generation Z from cyber unrest
2017 saw a 140% increase in IoT botnet infections from 2016, and those numbers are expected to increase. To anyone who regularly uses Internet-connected services, says Yossi Atias, GM IoT Security at BullGuard,
Read moreCybercriminals have seven-day advantage to weaponise vulnerabilities, according to new research from Tenable
Tenable®, Inc., the Cyber Exposure company, released a new research report that quantifies the window of opportunity cybercriminals have to weaponise vulnerabilities. The research found that cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims,
Read moreEMEA report predicts how apps will dramatically change the way we live and work
A report on the future of applications, highlighting major trends and projections that will significantly impact society, has been unveiled by F5 Networks application security and cloud solutions specialists.
Read moreThe evolution of Mirai could spell trouble for Windows business and home users
The infamous Mirai malware is now capable of targeting Windows systems, according to researchers at an antivirus firm. The original version of the malware was discovered in August 2016 and was used by cybercriminals to create botnets of infected Internet of Things (IoT) devices.
Read moreA pan-European response to cybercrime is critical
Cybercrime has become a well-financed global industry. Cybercriminals are very resourceful: they are increasingly operating as syndicates, conducting research and buying services from each other. In addition, says technology writer Bob Emmerson, threat surfaces are growing in line with the billions of connected users and devices.
Read moreIoT security: Access comes in all shapes and sizes
While there are many benefits for embracing the mainstream adoption of the Internet of Things (IoT), such as improved efficiencies, cost savings and enhancing customer experience, it can also bring issues of security to the forefront.
Read moreNorwegian researchers show how to hack and drive a Tesla car through its app
Research by Norwegian app security firm Promon has demonstrated that, by exploiting a lack of security in the Tesla smartphone app, cybercriminals could take control of the company’s vehicles. They have shown they can locate, unlock and drive the car away unhindered.
Read more