Buying into the Internet of Things starts out with smart home devices. Unfortunately, connecting your home devices to the Internet has its drawbacks. Here are some important factors to consider before buying smart devices for the home.
CES 2015 featured a Personal Privacy & Cyber Security Marketplace where security-oriented products were put on display. We looked at the devices covered in CES 2015 and spotted these technologies that focused on better privacy and data security.
While new technologies are always interesting, they also have the potential to burn consumers and vendors with privacy and security risks. With this in mind, here are four trends from CES 2015 that could potentially impact your security and privacy.
While the Internet of Everything is designed to make life easier with the use of interconnected networks and devices, you still have to remember that there are many ways your data can be misused or compromised.
While the smartification of the home has its benefits, the growing number of smart devices also requires a lot of time and energy just to maintain and manage the network of connected devices. What does it take to play the role of "Administrator of Things"?
This Trend Micro paper introduces the Automatic Identification Systems (AIS) used in the maritime industry, and provides a general overview of the technology as well as its identified vulnerabilities and threats.
A recent investigation revealed that the Sandworm zero day exploit could likely be used to target GE Intelligent Platform CIMPLICITY users. Find out what it does and how you can safeguard your systems against this emerging attack.