The 4G/5G campus network demonstrates the growing role of telecom technologies in different industries. Organizations and IT/OT experts need to keep up with these changes and consider their security implications.
From the fallout from the Hacking Team leak to the increased risks of using OS x, iOS, Android, and Flash Player, here's a look at how vulnerabilities shaped the threat landscape so far this year—and what to expect for the second half of 2015.
Earlier this year, a PoC malware that could infect Apple Macs through a Thunderbolt accessory was introduced. The sequel to the “Thunderstrike“ exploit doesn’t need physical access and can now be delivered online—just like PC threats.
Mere months after the very first backdoor access vulnerability for Macs was reported, another one has just been discovered with the same capability that doesn’t need physical access to do its dirty work.