The 35-day government shutdown may be on a brief hiatus, but with the temporary deal to fund federal departments slotted to end on Feb. 15, many government workers are worried
Businesses that are relying heavily on print are putting themselves at plenty of unnecessary risk.Businesses that are relying heavily on print are putting themselves at plenty of unnecessary security risk, a new
Triout malware was first detected in August 2018 which infected Android applications and had spyware capabilities such as recording phone calls and text messages, and more. Recently, the malware was
The post Attackers repackage popular Android VPN app with Triout malware appeared first on The Cyber Security Place.
Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack. An advanced persistent threat (APT) is a cyberattack executed
The post What is an advanced persistent threat (APT)? And 5 signs you’ve been hit with one appeared first on The Cyber Security Place.
An IoT device analyzed by researchers was found to have four security flaws that could allow attackers to perform denial of service (DoS) and man-in-the-middle(MITM) attacks. The device’s associated mobile
The post Denial-of-Service and Man-in-the-middle vulnerabilities found in Smart scale IoT device appeared first on The Cyber Security Place.
The convergence of IT, operational technology (OT) and industrial internet of things (IIoT) has raised concerns about cybersecurity, safety and data privacy for many organizations, according to a new Ponemon Institute study. Released
Safer Internet Day is an excellent opportunity for users of all kinds to brush up on their cyber safety knowledge — although security practice should be maintained on all days, it
The post Safer Internet Day: Are you where you think you are? appeared first on The Cyber Security Place.
The threat actor was believed to be working on this breach for over two to three years. Known by the pseudonym ‘C0rpz’, it was hinted that there was more than
The post Hacker behind Collection #1 credential database identified appeared first on The Cyber Security Place.
In late January, researchers found a vulnerability in Cisco RV320 and RV325 routers — routers aimed at the needs of small businesses and remote offices. Cisco quickly released a software
The post Cisco Router Vulnerability Gives Window into Researchers’ World appeared first on The Cyber Security Place.
A new year has arrived, and with it comes the opportunity to make all kinds of transformations to help your business. No matter how you navigated the dangerous threat landscape
The post 5 New Year’s Resolutions for Your IoT Security Strategy appeared first on The Cyber Security Place.
Smart devices aren’t very intelligent when it comes to protecting user privacy and handling security, according to a report by Internet of Things platform and service provider Pepper IoT and cybersecurity
The post Pepper IoT: Smart devices aren’t so bright when it comes to security appeared first on The Cyber Security Place.
Almost half of companies still can’t detect IoT device breaches, according to a Gemalto study. But, use of blockchain technology might provide a solution.’With IoT devices continuing to immerse themselves
It’s that time of year for prediction articles and the number has become almost overwhelming. This year, one of the trending topics I’ve noticed is the growth in Internet of
The post Security in an IoT World: Your Big Data Problem is Getting Bigger appeared first on The Cyber Security Place.