Tag "Hardware Security"

Back to homepage

Technology for the next generation at work

It’s almost 40 years since Bill Gates stated his aim of a computer on every desk and in every home and much has changed since then. Today we all carry


Securing your network in the IoT revolution

Instituting a comprehensive device management plan is essential to locking down Shadow IT at your organisation. The relationship between network security and the Internet of Things (IoT) has never been


Using deception to gain enterprise IoT attack visibility

The main lessons from attacks against Internet of Things (IoT) devices are to change default usernames and passwords, use longer passphrases to avoid brute force attacks, and make sure devices


Meltdown and Spectre will delay patching for most organizations

Complexity and challenges associated with the Spectre and Meltdown patches will result in companies delaying future patch rollouts, according to Barkly.72% of organizations planned to slow future rollouts and yet


Smart camera vulnerabilities could allow criminals to spy on victims

Kaspersky Lab researchers have discovered multiple security vulnerabilities in popular smart cameras that are frequently used as baby monitors, or for internal home and office security surveillance. According to the


How can IoT stakeholders mitigate the risk of life-threatening cyberattacks?

With an estimated 20 billion Internet-connected devices set to appear in our homes and offices by the end of the decade, future cyberattacks will dwarf what we’ve seen to date.


Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats

The security industry is facing a perfect storm created by the combination of an acute skill shortage, an expanding attack surface and increasingly sophisticated adversaries. As a result, the tactics


Backdooring connected cars for covert remote control

We’ve all known for a while now that the security of connected cars leaves a lot to be desired. The latest proof of that sad state of affairs comes from


Tackling the insider threat: Where to start?

Many organizations still believe the definition of an insider threat is limited to a rogue employee purposefully leaking embarrassing information, or nuking a couple of systems when he or she


Business Wire Suffers Week-Long DDoS Attack

Press release network Business Wire has admitted suffering an ongoing Distributed Denial of Service (DDoS) attack lasting a week so far, in a sign of the continued pressure high-profile firms