Home IOT Security

IOT Security

Amazon Prime Day scams resurface for 2021

With this year's Amazon Prime Day set for June 21-22, scammers are already touting "Early...

Everything You Need to Know About the Tyler Technology Ransomware Attack

We are witnessing a rise in ransomware attacks, as more and more companies are becoming victims to malicious actors. The Tyler Technology Ransomware...

Where to start on cybersecurity – Black Box Testing

In the past few weeks cybersecurity – Black Box Testing alone, we heard about the data breaches of Air India, Dominos Pizza, and...

Preventing security issues from destroying the promise of IoT

Internet of Things (IoT) devices fall into various categories. Some, such as those located in...

Sequitur Labs EmPOWER Service secures lifecycle management of IoT devices

Sequitur Labs introduced its EmPOWER Service, a new cloud-based offering that securely monitors, manages and...

Akamai adds automation and machine learning to protect user accounts, APIs and applications

Edge platform cybersecurity enhancements are intended to increase responsiveness and augment decision-making, the company said. ...

Two Firms Pay $43,000 Following a Data Breach Impacting SAF and Mindef Staff

Following two different malware attacks that occurred in 2019 causing the breach of sensitive information of 2,400 Ministry of Defence (Mindef) and Singapore...

Zoll Defibrillator Dashboard would execute contents of random Excel files ordinary users could import • The Register

A defibrillator management platform was riddled with vulnerabilities including a remote command execution flaw that could seemingly be invoked by uploading an Excel...

Western Australia Might Be Quarantining COVID Check-in Info

More than a year ago the COVID-19 pandemic was kicking off, but Western Australia finally decided to introduce legislation into state parliament meant...
- Advertisment -

Most Read

Google Releases New Framework to Prevent Software Supply Chain Attacks

As software supply chain attacks emerge as a point of concern in the wake of SolarWinds and Codecov security incidents, Google is proposing...

Can on-prem security experts make the move to the cloud?

As cloud computing grows in popularity across all use cases, cloud workloads have never been...

73% of enterprises suffer security and compliance issues due to internal misalignment

According to Enterprise Management Associates (EMA) and BlueCat’s recently published research report, nearly 3 in...

Cloud security posture confidence is high, yet most IT pros have experienced a cloud-related breach

OpsCompass announced the results of a report it conducted on cloud security posture and management...