Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.
Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.
Hotel cybersecurity is not just about protecting financial data — it extends to guests' physical and digital property, vulnerable endpoints and more.
Tourists should follow these travel security best practices to protect their devices and data from cybercriminals, especially in foreign countries.
A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.
With threats coming from all sides, it's easy for IT professionals to forget that cybercrime can take many unsophisticated forms.
Event cybersecurity strategies and tools can help improve the digital security and, in turn, the physical security of guests at your event.
There are many parallels between cybersecurity and physical security when it comes to prioritizing valuables and being careful to keep them safe.
With Blackhat USA behind us and Defcon in its full throes, there seems to be a trend away from purely digital hacks and toward physical devices. In that spirit, here are nineteen amazing hacks that cross the physical divide.