• TOP
  • Top Rankings

Top Rankings

1 Trend Micro Reveals Top Ten Regions Affected by IoT Security Threats
2017/08/16

Trend Micro Reveals Top Ten Regions Affected by IoT Security Threats

Smart home devices and applications took center stage at many tech events in 2017 from CeBIT to Computex, and even MWC 2017, as cybersecurity threats have continued to grow hand in hand with the increase of connected devices. Trend Micro Incorporated today released the “Trend Micro 2017 1H Smart Home Network Security Summary,” revealing the top 10 regions most affected by cyberattacks on a home router and identifying key factors for in-home cyber security threat.

2 IoT Device Security At Home
2017/09/25

IoT Device Security At Home

My girlfriend read something that worried her about the security risks posed by Internet of Things (IoT) devices at home. She had recently purchased a new TV, and she has an older home security system. She asked if her privacy might be at risk.

3 Security Risks in a Technology-Driven World
2017/10/23

Security Risks in a Technology-Driven World

Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.

4 Expectations for Communication Service Providers on IoT Security
2017/07/26

Expectations for Communication Service Providers on IoT Security

What used to be the stuff of science fiction has turned into reality. No longer do we dream of a world where devices around us are interconnected, share information with one another, and carry out actions autonomously — we are now living in it, thanks to the so-called Internet of Things (IoT).

5 How Secure are your Internet-Enabled Voice Assistants?
2017/08/24

How Secure are your Internet-Enabled Voice Assistants?

Households all over the world are rapidly adopting conversational user interface (CUI) technology, or the tech behind the voice assistants we know as Siri, Alexa, Cortana, and Google Assistant. Reports say that over 24 million voice-enabled machines were shipped in 2017, and the growth shows no sign of stopping. As more of these devices become available, users are quickly using them to their fullest potential, creating increasingly connected homes.

6 Integrating Security Into the IoT Strategy in the New Converged Environment
2017/10/11

Integrating Security Into the IoT Strategy in the New Converged Environment

The rise of the Internet of Things (IoT) started when consumers began to interconnect home, work and mobile devices via the cloud so that valuable personal and work information could be easily accessed, no matter what the users were doing or where they might be located.

7 The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard
2017/08/21

The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard

In many instances, researchers and engineers have found ways to hack into modern, internet-capable cars, as has been documented and reported several times. One famous example is the Chrysler Jeep hack that researchers Charlie Miller and Chris Valasek discovered. This hack and those that have come before it have mostly been reliant on specific vulnerabilities in specific makes and/or brands of cars.

8 Industrial Cyber Security: Why IT and OT collaboration is no longer an option but a necessity
2017/07/06

Industrial Cyber Security: Why IT and OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to the Internet. While, this connectivity helped to improved the efficiency, security was at best a minimal consideration.

9 RouteX Malware Found Exploiting Remote Access Vulnerability in Netgear Routers
2017/09/29

RouteX Malware Found Exploiting Remote Access Vulnerability in Netgear Routers

A remote access and command execution vulnerability (CVE-2016-10176) was recently seen actively exploited by RouteX, a malware that targets Netgear routers. RouteX is designed to turn an infected router into a Socket Secure (SOCKS) proxy that in turn limits access to the device to the attacker.

10 Forecasting the Future of Ransomware
2017/07/25

Forecasting the Future of Ransomware

There's no question that ransomware is one of the most formidable threats to a business. With so much riding on digitized data, important applications and other systems, any interruption to access of these crucial assets can quickly spell disaster for an organization.

PageTop