Five ways attackers can create havoc in smart homes
Attack motives include burglaries, cyber stalking, botnet creation, cryptocurrency mining hubs, theft of personal information or financial information.
Keysight solution helps prevent cyber-attacks on connected vehicles
Potential issues identified post-production, with the risk of recalls, cost orders of magnitude more to repair than when found during pre-deployment testing.
Thales launches new Gemalto Digital ID wallet
Digital ID wallet is designed to only share with third parties information that the citizen is willing to share.
430,000 people hit with financial malware
Financial malware, that is malware that targets finances, cryptocurrencies and web-money services, has increased by 7% from the same period last year, according to new research from Kaspersky.
Gartner, Forrester name Retarus for Email Security
The information logistics firm was listed as one of the twelve most important providers of email security services in the world by Forrester Research.
Business ransomware detections spiking - Malwarebytes
Ransomware attackers are targeting large, ill-prepared public and private organisations with easy-to-exploit vulnerabilities.
Cohesity launches new vulnerability scan using backup data
The application works by scanning backup copies on to identify any vulnerabilities across an organisation’s IT environment.
New research highlights third party risks facing organisations
modern risk management must account for ongoing changes in third-party relationships and mitigate risks in an iterative way — that is, on a continual basis, rather than at specified intervals."
ForgeRock launches open-source IoT edge controller solution
The IoT Edge Controller runs on smart edge devices, and provides the privacy, integrity and security required for devices to register as identities.
SentinelOne launches next-gen server protection offering
SentinelOne has released a new next-generation server and protection offering, which is purpose-built for containers.
F5 Networks' BIG-IP load balancer product vulnerable to attack
Organisations that use F5 Networks BIG-IP load balancer should immediately check their configurations to ensure they are protected from potentially serious security issues.
SolarWinds announces updates to web performance monitoring products
With the improved functionalities, technology professionals managing every type of environment can monitor website availability and performance.
Yubico launches lightning-compatible security key
Today, the YubiKey 5Ci can be used to secure the 1Password, Bitwarden, Dashlane, Idaptive, LastPass, and Okta iOS mobile applications.
Popular enterprise printers riddled with security risks
Researchers from NCC Group analysed different aspects of six mid-range enterprise printers manufactured by HP, Ricoh, Xerox, Lexmark, Kyocera, and Brother.
67b emails rejected due to 'highly malicious attack techniques'
Out of 160 billion emails analysed, 42% were rejected.
More than half of personal data breaches caused by human error
"The biggest cause of breaches remains the fallibility of people and an inherent inability of employees to send emails to the right person."
Cylance report looks into questionable pentesting practices
The report demonstrates how the line distinguishing pentesting exercises from actual threat actor behaviour has thinned.
Fortinet integrates security fabric with Alibaba Cloud
The combination of technologies will provide extended security visibility and control from the data center to the cloud.
Rubrik enters data governance and disaster recovery orchestration market
Sonar addresses the intensifying risk of data privacy breaches and compliance penalties by applying machine learning to discover sensitive data.
Slack tackles balance between productivity and security
The new features include more options to protect data without interrupting employees’ requirements to get work done.