iot
Cybersecurity News – Hackers Aim No Worse Than Cupid
edguards | | Defense, Error, Fraud, Human Error, iot, Law, pentesting, Phishing, risk management, Scamming, social engineering, technology, threats
Take a glance at the most discussed cybersecurity news of the week. Happy Valentine’s Scam ... The post Cybersecurity News – Hackers Aim No Worse Than Cupid appeared first on EdGuards - ...

Don’t Be A “Dumb” Carrier
Mike O'Malley | | Application Security, Information Security, Internet of things, iot, Mobile Security, Network Security, security, service provider
By next year, it is estimated that there will be 20.4 billion IoT devices, with businesses accounting for roughly 7.6 billion of them. While these devices are the next wireless innovation to ...

Your Lenovo Watch X Is Watching You & Sharing What It Learns
David Sopas | | account takeover, BLE, Blog, bluetooth, Checkmarx Security Research Team, Internet of things, iot, Lenovo Watch X, mitm, smart watch, Sniffing, Technical Blog
A friend of mine offered me a Lenovo Watch X – which costs around €60 – in return for helping him with a security project. I was impressed with the design and ...

The Business of Organised Cybercrime
Guest article by David Warburton, Senior Threat Research Evangelist, F5 NetworksTeam leader, network administrator, data miner, money specialist. These are just some of the roles making a difference in today’s enterprises. The ...
What If Cybersecurity Culture Is a Solution
edguards | | Admins, Audit, CIO, Defense, Fraud, Insident response, iot, Law, Ransomware, team, technology, threats
Take a glance at the most discussed cybersecurity topics of the week. Beep! Your car ... The post What If Cybersecurity Culture Is a Solution appeared first on EdGuards - Security for ...

Extreme Networks Extends Cybersecurity Reach to IoT Endpoints
Extreme Networks has made generally available a device the size of a pack of playing cards that organizations can drop on to their networks to secure Internet of Things (IoT) endpoints. Abby ...
Security Boulevard

2019 Digital Identity Progress Report
Schools out for summer? Well not quite. Unless you're living in the east coast of Australia, it's looking decidedly bleak weather wise for most of Europe and the American east coast. But ...

Automotive Technologies and Cyber Security
A guest article authored by Giles KirklandGiles is a car expert and dedicated automotive writer with a great passion for electric vehicles, autonomous cars and other innovative technologies. He loves researching the ...

The Challenges of DIY Botnet Detection – and How to Overcome Them
Johnathan Azaria | | Application Security, backdoor uploader, botnet, botnet detection, command-and-control server, ddos, DDoS Mitigation, hacking tool, iot, layer 7 attack, Remote Code Execution, Research & Reports, spambot, sql injection
Botnets have been around for over two decades, and with the rise of the Internet of Things (IoT) they have spread further to devices no one imagined they would – printers, webcams, ...

Smart mobility and the blockchain
Didier Benkoel-Adechy | | Automotive, Bitcoin, blockchain, Digital Identity, drivers license, encryption, enterprise, enterprise security, eSIM, identity verification service, Internet of things, iot, Mobile, SIM, smart mobility, smart proof, Trust, trusted digital identity
Can a consortium blockchain approach allow IoT industry players launch and secure new services such as car-sharing apps? ...