Are IoT Devices the Achilles Heel of OT Systems?

When implementing cybersecurity measures, IT systems are often the first consideration. Historically, cybercriminals have made IT systems the focus of their attacks in the hopes of hijacking sensitive, private data to hold for ransom or utilise for other nefarious means. Operational technology (OT) systems, on the other hand, have long been considered inherently secure and

Read more

Prioritising security as electric vehicle charging ramps up

As governments around the world instigate and progress sustainable transport policies and initiatives, the need for more electric vehicle (EV) charge points grows. The IoT underpins this relatively new infrastructure by enabling the exchange of operational and other data. To secure and protect this data and charging assets, charge point operators (CPOs) must design their

Read more

Sequitur Labs foresees increased need for device security in 2022

Seattle – With significant growth projected in the global IoT market over the next 6 years, the need to subsequently secure devices at the edge from attacks, safe and secure through the manufacturing process, and managed securely throughout the life of the product will follow a similar trajectory, predict experts at Sequitur Labs.

Read more

Over 600,000 new malicious programs registered globally every day in 2021

Data acquired and calculated by Finbold projects that about 604,059 new malicious programs (malware) and potentially unwanted applications (PUA) are globally registered daily in 2021.

Read more

5 challenges still facing the Internet of Things

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more

Why device security is up to the user

More devices mean more susceptible connections from server to receiver. While that might be a cynical view, it is a factual one. Smart doorbells with face recognition, pet tech with microphones, Teslas with cameras: devices are only becoming more widespread but, generally speaking, not improving when it comes to security.

Read more

Healthcare IT solutions company, Comport, discusses ways to protect hospitals from ransomware attacks

In response to the rising threat of ransomware in the healthcare industry, Comport, a cloud computing and Healthcare IT Solutions Company, held discussions with top healthcare CIO’s discussing ransomware protections that they may want to consider.

Read more

Protecting Generation Z from cyber unrest

2017 saw a 140% increase in IoT botnet infections from 2016, and those numbers are expected to increase. To anyone who regularly uses Internet-connected services, says Yossi Atias, GM IoT Security at BullGuard,

Read more

Cybercriminals have seven-day advantage to weaponise vulnerabilities, according to new research from Tenable

Tenable®, Inc., the Cyber Exposure company, released a new research report that quantifies the window of opportunity cybercriminals have to weaponise vulnerabilities. The research found that cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims,

Read more

EMEA report predicts how apps will dramatically change the way we live and work

A report on the future of applications, highlighting major trends and projections that will significantly impact society, has been unveiled by F5 Networks application security and cloud solutions specialists.

Read more

The evolution of Mirai could spell trouble for Windows business and home users

The infamous Mirai malware is now capable of targeting Windows systems, according to researchers at an antivirus firm. The original version of the malware was discovered in August 2016 and was used by cybercriminals to create botnets of infected Internet of Things (IoT) devices.

Read more

A pan-European response to cybercrime is critical

Cybercrime has become a well-financed global industry. Cybercriminals are very resourceful: they are increasingly operating as syndicates, conducting research and buying services from each other. In addition, says technology writer Bob Emmerson, threat surfaces are growing in line with the billions of connected users and devices.

Read more

IoT security: Access comes in all shapes and sizes

While there are many benefits for embracing the mainstream adoption of the Internet of Things (IoT), such as improved efficiencies, cost savings and enhancing customer experience, it can also bring issues of security to the forefront.

Read more

Norwegian researchers show how to hack and drive a Tesla car through its app

Research by Norwegian app security firm Promon has demonstrated that, by exploiting a lack of security in the Tesla smartphone app, cybercriminals could take control of the company’s vehicles. They have shown they can locate, unlock and drive the car away unhindered.

Read more