Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?
Even if you're not into car hacks, you should still learn about the future of vehicle cybersecurity and the challenge it represents. But if you are, read on to learn how I hacked my connected car.
Security researchers identified a malspam campaign targeting Italian users with a variant of the sLoad downloader.
Physical theft accounted for two-thirds of inventory shrinkage in 2016, suggesting that retailers need to improve their loss prevention strategies.
Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.
Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.
Hotel cybersecurity is not just about protecting financial data — it extends to guests' physical and digital property, vulnerable endpoints and more.
Tourists should follow these travel security best practices to protect their devices and data from cybercriminals, especially in foreign countries.
A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.
With threats coming from all sides, it's easy for IT professionals to forget that cybercrime can take many unsophisticated forms.