Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
The extent with which 5G networks use software is one of the top security issues for mobile networks as well as devices and current technologies (for example, 3G, 4G) that use or incorporate it, according to an EU report supported by the European Commission
With the growing popularity of remote working arrangements in enterprises, we revisit the security threats and recommendations for IoT devices interchangeably connected to the network at home and in the office.
As the field of telecommunication continues to evolve, so should its security. Understanding its current threat landscape can help reduce the impact of crimes like telecom fraud and prepare us for future threats in the age of the IoT.
Malware can hide from antivirus (AV) software by abusing features in Intel Software Guard Extensions (SGX). This was recently demonstrated by Michael Schwarz, Samuel Weiser, and Daniel Gruss, researchers at Graz University of Technology.
To move forward, we need to look into the past to figure out what the best course of action is. Take a trip down memory lane with this infographic to see how far we've come in securing the digital world.