The internet of things (IoT) is exploding, and enterprise IoT is seeing massive growth as well. Every modern organization is using IoT devices to help run their business. Although IoT opens the door to unprecedented connectivity as well as innovative approaches and services, it also brings with it new cybersecurity...
European police gained access to messages sent via the encrypted cellular service EncroChat, leading to the arrest of hundreds of alleged organized crime members across the Netherlands, France, Norway, Sweden and the U.K., the EU's law enforcement intelligence agency Europol reports.
Fraudsters are using a revamped version of the Alina Trojan to target Windows-based POS devices to steal payment card data, according to Century Link's Black Lotus Labs. The malware operators are using unsecured DNS protocols to exfiltrate the data.
The U.S. Federal Communications Commission has officially designated China's Huawei Technologies and ZTE Corp. as "national security threats," barring American telecommunications firms from using certain federal funds to buy their equipment, such as for building 5G networks.
Using artificial intelligence and machine learning, bundled with an orchestration layer, will help CISOs mitigate cyberthreats, says Bharat Anand, chief of technology at NATGRID, the intelligence sharing network of the government of India.
In this whitepaper learn how organizations can utilize an on-premises Data Loss Prevention (DLP) system to manage and protect their critical data, and how the same need can be transferred into the cloud as well.
Japan has been scanning its entire IPv4 address space to find insecure home routers, web cameras and sensors. The results are encouraging, and the country's program could serve as a model for other nations aiming to avoid large-scale IoT security problems.
IoT devices can be made cheaply and quickly. But as a result, they may lack adequate security features. The Atlantic Council is proposing regulations that would require technology retailers to sell devices that meet security standards, which would, in turn, put pressure on IoT component makers.
This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity?
Threat actors use botnets - networks of infected computers - for various cybercriminal purposes, most significantly distributed denial of service attacks against predefined targets. Today, botnets with distributed denial of services (DDoS) capabilities are even for sale on the Dark Web.
How has this threat...
Without labelling or standards, consumers and enterprises face challenges when buying IoT devices. Brad Ree of the ioXt Alliance describes work underway to harmonize the security environment.
The Sodinokibi ransomware gang is targeting point-of-sale payment device software after infecting networks with its crypto-locking malware, according to Symantec.
Enterprises need to move away from manual threat detection methods to leverage artificial intelligence, which can help boost defenses, says Dr. Jassim Haji, president of Artificial Intelligence Society, Bahrain Chapter.
Integrating IoT devices into OT systems brings a raft of security concerns. Microsoft's acquisition of CyberX, which offers a specialized IoT/OT security platform, may give some organizations more confidence to tackle what can be a messy business of securing and monitoring IoT controls across a network.
If you've managed to equip your home with smart devices and appliances that work properly, you probably think you're all set. But there are no regulations around how long manufacturers must provide security updates, which could mean a smart device could become a risk.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.