IoT and ICS Security

IOT and ICS Security

Unlocking Android phones with a 3D-printed head

A journalist uses a 3D-printed version of his own head to test facial recognition on the iPhone X and Android devices. The post Unlocking Android phones with a 3D-printed head appeared first ...
Cybersecurity as a Selling Point: Retailers Take Note

Cybersecurity as a Selling Point: Retailers Take Note

UK-based retailers were no strangers to data breaches in 2018. In June, Dixons Carphone announced a breach of 5.9 million customer bank card details and 1.2 million personal data records, and the ...
2018 In Review: Healthcare Under Attack

2018 In Review: Healthcare Under Attack

Radware’s ERT and Threat Research Center monitored an immense number of events over the last year, giving us a chance to review and analyze attack patterns to gain further insight into today’s ...
Facing the Fear and Securing the Internet of Things (IoT)

Facing the Fear and Securing the Internet of Things (IoT)

There are officially more IoT devices than humans in the world. And by 2020, there will be twice as many of them than us. And according to a recent study by Gemalto1, ...
I Am Alexa, and I Am Here to Help: Simple Tweaks to Help Reduce Risk from Voice-Controlled Devices

I Am Alexa, and I Am Here to Help: Simple Tweaks to Help Reduce Risk from Voice-Controlled Devices

Over the last few years, smart devices – once a rare novelty for only the elite and early-adopters – have become a common household item, partly in thanks to Amazon’s economical Alexa-powered ...
Ubiquitous Video Surveillance and the Policing Paradigm Change it Brings

Ubiquitous Video Surveillance and the Policing Paradigm Change it Brings

Policing in the 21st Century is obviously changing rapidly. New technological advances are fundamentally changing the way in which police forces and related government entities can track, locate, and collect evidence.Two game ...
AppSec Is Dead, but Software Security Is Alive & Well

AppSec Is Dead, but Software Security Is Alive & Well

Everyone agrees that an enterprise’s application ecosystem must be protected, especially when data breaches are reported with alarming frequency and the average total cost of a breach comes in at $3.62 million ...

California IoT Security Law: A Nearsighted, Toothless Guard Dog or a Wolf in Sheep’s Clothing?

With three new sections added to the California Civil Code, California became the first U.S. state with a cybersecurity law specifically for internet-connected devices on September 28, 2018. The new Security of ...

Sennheiser Headsets Open Door to Hackers | Avast

When you put on a world-class brand headset before using your computer, you’re probably not worried that it will open your world to hackers. But according to this new report, if you ...
Hackers Exploit UPnP in Routers to Expose Private Networks to Attacks

Hackers Exploit UPnP in Routers to Expose Private Networks to Attacks

Hackers are exploiting insecure UPnP implementations in routers to expose millions of computers from inside private networks to SMB attacks. Universal Plug and Play (UPnP) is a service that allows devices to ...
Security Boulevard
Loading...