Researchers from Threatcare and IBM X-Force Red joined forces to test several smart city devices, with the goal of investigating "supervillain-level" attacks. Here's what the teams found.
An unknown threat actor leaked the source code for the Android malware Exobot, leading to fears of an impending attack similar to the massive DDoS incident that hit domain name provider Dyn in 2016.
Security researchers identified two new threats in the wild that are designed to compromise consumer devices to build IoT botnets.
While securing the variety of known devices on your network is hard work, it may feel impossible to manage uninvited guests. Here's how to effectively manage rogue devices.
WPA3, which was released in June 2018, promises to improve Wi-Fi security — but the changes will be gradual because the Wi-Fi Alliance will need to certify routers to work with the new protocol.
The 2018 Cost of a Data Breach Study from Ponemon Institute reveals that the total cost, per-capita cost and average size of a data breach have all increased year over year.
Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.
In addition to protecting laptops, smartphones, tablets and IoT devices, AI-powered UEM solutions can help security leaders manage apps, content, data and user identity and access more efficiently.
As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.
Although connected devices make our daily lives easier, IoT data, if not properly secured, can cause serious financial and reputational damage to companies deploying and manufacturing this technology.