Device Security

Cyber Trust Mark: The Impacts and Incentives of Early Adoption
The Cyber Trust Mark is a labeling initiative for consumer IoT devices in the United States that builds on work undertaken by the FCC and NIST, establishing data privacy and cybersecurity standards ...
Security Boulevard

IT Leaders Lack Confidence in IoT Security Plans
There is a significant lack of confidence among IT leaders regarding their internet-of-things (IoT) security plans ...
Security Boulevard
Shield Your Device: Mitigating Bluetooth Vulnerability Risks
Wajahat Raja | | Android vulnerability, authentication bypass, Bluetooth Exploits Update, Bluetooth Protocol, Bluetooth vulnerability, Cross-Platform Security Flaw, CVE-2023-45866, Cyber Threats, Cybersecurity, Cybersecurity News, cybersecurity threats, Device Communication, Device Security, Digital Threats, Exploits, iOS Vulnerability, IoT Security, Linux vulnerability, macOS vulnerability, Physical Security, Proactive Security, security measures, software-patches, Viakoo Labs, Vulnerability Risks Mitigation
In the ever-evolving landscape of cybersecurity, a significant Bluetooth security flaw has emerged, posing a threat to devices operating on Android, Linux, macOS, and iOS. Tracked as CVE-2023-45866, this flaw allows threat ...
34 WDM And WDF Models Vulnerable: Protect Your Devices
Wajahat Raja | | BYOVD attack, Cybersecurity News, Device Security, Device takeover risks, Driver vulnerabilities, Firmware access drivers, Kernel memory access, Network device vulnerabilities, Security threats, Vulnerable drivers, WDM and WDF models
In a significant revelation, security experts have uncovered a substantial number of Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers with potential vulnerabilities that could be exploited by malicious actors ...

IoT Connected Devices Pose Significant Risk to Organizations
Security flaws in connected devices and the IoT are plaguing the digital landscape, impacting a broad range of industries ...
Security Boulevard

IoT Devices Risky Business for the Enterprise
As the number and diversity of IoT devices proliferates and diversifies, organizations find themselves under constant assault from threat actors who often turn to the same attack vectors time and again. Successfully ...
Security Boulevard

5 Top IoT Security Challenges and Solutions
The internet of things (IoT) is growing exponentially, with as many as 25 billion devices expected to be deployed by 2030. IoT technology has many benefits for consumers, corporations and, in particular, ...
Security Boulevard

FBI Issues Warning on FIN7 USB Stick Exploit
The FBI issued a warning that a group of threat actors from the FIN7 cybercrime group has resorted to an old trick—mailing USB sticks loaded with BadUSB malware to companies. The packages ...
Security Boulevard

Discovered Tablet Confirms Russian Covert Action in Libya
Christopher Burgess | | covert action, Cybersecurity, Device Security, Libya, Russia, travel, Wagner Group
When you lose your device, be it a laptop, tablet or phone, what have you lost? That is the question every CISO should be encouraging employees to ask as they provision and ...
Security Boulevard

Demystifying SSD Security
You left your laptop in a taxi or it was confiscated at a customs checkpoint. How do you ensure your personal or corporate data is safe? There are a number of best ...
Security Boulevard