Home IoT
Cybersecurity & Coronavirus: Protecting Customers at Home
During these challenging times, when everyone is working, studying, and streaming from home, securing the home network is more important than ever. I’m co-producing a webinar about this, where you can learn ...
How to Provide IoT Security in the ‘Connected Everything’ Era: NIST Guidelines
Do you remember the name Mirai? Sure, you do. Back in 2016, Mirai became the first IoT botnet to make headlines by hitting global DNS provider Dyn and taking down almost half ...
Why CSPs Should Care About Phishing
Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to ...
Silex Malware: Deadly New Virus Bricks 1000s of IoT Devices
Your IoT’s not sick – Someone just turned it into a brick! A 14-year-old hacker created a new strain of malware called “Silex malware” which bricked over 4000 IoT devices in the ...
Brute Force Attacks on IoT – Here to Stay?
IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, ...
10 Ransomware Attacks You Should Know About in 2019
Ransomware was deemed one of the biggest malware threats of 2018, and it continues to disrupt the operations of businesses and the daily lives of individuals all over the world in 2019 ...
5 Key Takeaways from #MWC19
MWC went by so fast that you may have missed some of the highlights. Luckily, we’ve compiled the following takeaways from the Barcelona conference. With apologies to Don Adams, it really is ...
Home Digital Asset Security
Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a ...
5G: Big CSP “Security as a Service” Opportunity
Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and ...
Home Router…, or Trojan Horse?
Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store ...

