Even if you're not into car hacks, you should still learn about the future of vehicle cybersecurity and the challenge it represents. But if you are, read on to learn how I hacked my connected car.
Avast security analysts reported that the Hide 'N Seek botnet continues to grow by infecting vulnerable Internet of Things (IoT) devices still using their default passwords.
Endpoint Management Missteps in the ‘Die Hard’ Franchise: Viewing a Holiday Favorite Through a Cybersecurity Lens
Security professionals can learn valuable lessons about endpoint management from the "Die Hard" franchise of holiday-themed thrillers.
Collaborative industry partnerships, a hardened attack surface and a well-practiced incident response plan are all critical in the fight against emerging cybersecurity threats.
5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" — but security leaders must prepare for the coming 5G security threats.
A group of threat actors known as Outlaw is using a Perl Shellbot to breach enterprise IoT devices.
A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts.
Using a virtual private network (VPN) to obfuscate your location and encrypt data is a powerful way to boost data privacy and prevent the tracking, stalking and theft of personal information.
Under the Charter of Trust, limiting the impact of digital transformation and cybersecurity and building trust for users has to be the result of close collaboration at all levels.
These days, many electronics companies deploy industrial IoT technologies without evaluating or protecting against cybersecurity risks, or preparing a fast and effective response to a breach.