The Internet of Things (IoT) is transforming our homes, businesses and public spaces – mostly for the better – but without proper precautions IoT devices can be an attractive target for malicious actors and cyberattacks. Security threats involving IoT devices often stem from the fact that many IoT devices usually have single-purpose designs and may lack broader capabilities to defend themselves in a hostile environment. For example, a door bell, a toaster or a washing machine frequently do not contain as much storage, memory and processing capability as a typical laptop computer.
In June, Apple announced iOS 14 updates that, among other changes, would require apps to ask users for permission to collect and share data with developers. As a result, Facebook has just announced it would no longer collect the identifier for advertisers (IDFA) on their own apps on iPhones.
Risk Based Security's Q1 2020 Vulnerability report, for the first time in years, saw a decline in the quantity of vulnerabilities being reported. However, the latest trends indicate we may be back on track to see the same amount of vulnerabilities, or even more, than last year. Why might this be the case? One possible reason: the Vulnerability Fujiwhara Effect.
The Transportation Security Administration (TSA) has completed installation of new acrylic barriers at security checkpoints throughout Chicago O’Hare International Airport (ORD) in the agency’s ongoing efforts to contain the spread of COVID-19.
Miami Dade College has launched its new, state-of-the-art Cybersecurity Center of the Americas, a facility designed to mimic what a Security Operations Center (SOC) looks and feels like.
New Digital Shadows research provides a breakdown of the traffic data behind the top cybercriminal forums and how they square up against each other. The research was inspired by a June 2020 post on the English-language cybercriminal carding forum Altenen announcing a “big victory” for the site in terms of its website traffic rank statistics. This piqued the interest of the Digital Shadows research team who compared how the statistics aligned with their pre-existing perceptions of these sites, whether they show any trends they were previously unaware of, and if there was anything that would indicate deceptive tactics behind these numbers.
The unfolding COVID-19 crisis has been the most significant test of the world’s internet infrastructure to date. With employers and schools moving to remote environments, the expectation was that the expanded use of Software-as-a-Service (SaaS) tools like video conferencing would lead to crippling levels of web traffic. On top of that, experts anticipated the increase in internet use would prompt a corresponding rise in network attacks from cybercriminals. Many in the industry were concerned that the internet would not be able to sustain these unseen levels of duress.
Here, we talk to Mohit Tiwari, CEO and co-founder of Symmetry Systems, about the current threat landscape, the role of CISOs and the unique challenges COVID-19 and work-from-home (WFH) pose to CISOs and security teams.
Regardless of industry, no company can escape the widespread reach and impact of data. Whether a company is collecting account information from customers or aggregating platform usage data, handling large amounts of data has become the norm. While this creates boundless new opportunities for businesses in analytics and real-time decisioning, it also introduces new risks that organizations need to consider and prevent where possible.
Governor Andrew M. Cuomo announced more than $17 million in federal funding has been awarded to 178 nonprofit organizations facing an increased risk of terrorism to strengthen the security of their facilities as well as enhance their overall preparedness.