Tag "Security Vulnerability"

Back to homepage
Software

Bad security hygiene still a major risk for enterprise IT networks

Unpatched vulnerabilities, along with growing network and application complexity pose an ongoing security risk which could threaten the security of enterprise IT networks. Analyzing the biggest security findings over the

Hardware/Network

Major vulnerabilities found in new Wi-Fi standard

The latest WPA3 WiFi security and authentication standard may be suffering from serious safety flaws of its own.  This is according to a group of researchers – Mathy Vanhoef and Eyal Ronen, who issued

Hardware/Network

Vulnerabilities in smart IP cameras expose users to privacy, security risks

Bitdefender has found new vulnerabilities in IoT cameras that are meant to be protecting people’s homes. The global smart camera market is predicted to grow at a CAGR of 8

Software

80 Eye-Opening Cyber Security Statistics for 2019

It’s an interesting and challenging time to be working in the cyber security industry. By and large, research indicates that cybercrime is on the rise — news headlines support these

Industry Insights

Risk-Based Security Scores that Matter to your Business

According to the vulnerability database, CVE Details, there were over 14,000 vulnerabilities discovered in 2017, which was over double the 6,000 plus vulnerabilities discovered in 2016. Each of these vulnerabilities can

Software

Norsk Hydro Loses $40 Million After Ransomware Attack

It has been reported that Norsk Hydro may have lost $40 million following last week’s ransomware attack. On a preliminary basis, the financial impact during the first week was estimated at between

Industry Insights

File Sharing Links Leave Data out of the Box

Security researchers have found that hundreds of thousands of documents were unintentionally leaked after multiple companies left sensitive corporate and customer data exposed on their Box enterprise storage accounts. The

Industry Insights

Smart Cities Are Most Vulnerable to Cyber Security Risks

To reduce the evident cyber risks, a cyber-resilient and trusted environment is a prerequisite. With the urban civilization turning to smart technology solutions to increase operational efficiency and share information,

Hardware/Network

Authentication Bypass Vulnerability: What is it and how to stay protected?

Organizations failing to enforce strong access policy and authentication controls could allow an attacker to bypass authentication. Attackers could also bypass the authentication mechanism by stealing the valid session IDs

Industry Insights

Cyber security news round-up

Our latest cyber news round up features a report which suggests legacy applications could be posing a serious cyber security risk to hospitals. Elsewhere the UK government is urging innovators