In response to the rising threat of ransomware in the healthcare industry, Comport, a cloud computing and Healthcare IT Solutions Company, held discussions with top healthcare CIO’s discussing ransomware protections that they may want to consider.
2017 saw a 140% increase in IoT botnet infections from 2016, and those numbers are expected to increase. To anyone who regularly uses Internet-connected services, says Yossi Atias, GM IoT Security at BullGuard,
Tenable®, Inc., the Cyber Exposure company, released a new research report that quantifies the window of opportunity cybercriminals have to weaponise vulnerabilities. The research found that cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims,
A report on the future of applications, highlighting major trends and projections that will significantly impact society, has been unveiled by F5 Networks application security and cloud solutions specialists.
The infamous Mirai malware is now capable of targeting Windows systems, according to researchers at an antivirus firm. The original version of the malware was discovered in August 2016 and was used by cybercriminals to create botnets of infected Internet of Things (IoT) devices.
Cybercrime has become a well-financed global industry. Cybercriminals are very resourceful: they are increasingly operating as syndicates, conducting research and buying services from each other. In addition, says technology writer Bob Emmerson, threat surfaces are growing in line with the billions of connected users and devices.
While there are many benefits for embracing the mainstream adoption of the Internet of Things (IoT), such as improved efficiencies, cost savings and enhancing customer experience, it can also bring issues of security to the forefront.
Research by Norwegian app security firm Promon has demonstrated that, by exploiting a lack of security in the Tesla smartphone app, cybercriminals could take control of the company’s vehicles. They have shown they can locate, unlock and drive the car away unhindered.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.