Category Archives: Hardware/Network

Could a shutdown ignite insider threats?

The 35-day government shutdown may be on a brief hiatus, but with the temporary deal to fund federal departments slotted to end on Feb. 15, many government workers are worried

The post Could a shutdown ignite insider threats? appeared first on The Cyber Security Place.

Printer-related security risks on the rise

Businesses that are relying heavily on print are putting themselves at plenty of unnecessary risk.Businesses that are relying heavily on print are putting themselves at plenty of unnecessary security risk, a new

The post Printer-related security risks on the rise appeared first on The Cyber Security Place.

Attackers repackage popular Android VPN app with Triout malware

Triout malware was first detected in August 2018 which infected Android applications and had spyware capabilities such as recording phone calls and text messages, and more. Recently, the malware was

The post Attackers repackage popular Android VPN app with Triout malware appeared first on The Cyber Security Place.

Senators Urge Security Audit of Foreign VPNs

Two US senators have called for an urgent investigation into whether foreign-owned Virtual Private Networks (VPNs) represent a risk to national security. Ron Wyden and Marco Rubio signed a joint

The post Senators Urge Security Audit of Foreign VPNs appeared first on The Cyber Security Place.

What is an advanced persistent threat (APT)? And 5 signs you’ve been hit with one

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack. An advanced persistent threat (APT) is a cyberattack executed

The post What is an advanced persistent threat (APT)? And 5 signs you’ve been hit with one appeared first on The Cyber Security Place.

Denial-of-Service and Man-in-the-middle vulnerabilities found in Smart scale IoT device

An IoT device analyzed by researchers was found to have four security flaws that could allow attackers to perform denial of service (DoS) and man-in-the-middle(MITM) attacks.  The device’s associated mobile

The post Denial-of-Service and Man-in-the-middle vulnerabilities found in Smart scale IoT device appeared first on The Cyber Security Place.

Converged IT and OT to Advance Security Maturity

The convergence of IT, operational technology (OT) and industrial internet of things (IIoT) has raised concerns about cybersecurity, safety and data privacy for many organizations, according to a new Ponemon Institute study. Released

The post Converged IT and OT to Advance Security Maturity appeared first on The Cyber Security Place.

Safer Internet Day: Are you where you think you are?

Safer Internet Day is an excellent opportunity for users of all kinds to brush up on their cyber safety knowledge — although security practice should be maintained on all days, it

The post Safer Internet Day: Are you where you think you are? appeared first on The Cyber Security Place.

Hacker behind Collection #1 credential database identified

The threat actor was believed to be working on this breach for over two to three years. Known by the pseudonym ‘C0rpz’, it was hinted that there was more than

The post Hacker behind Collection #1 credential database identified appeared first on The Cyber Security Place.

Cisco Router Vulnerability Gives Window into Researchers’ World

In late January, researchers found a vulnerability in Cisco RV320 and RV325 routers — routers aimed at the needs of small businesses and remote offices. Cisco quickly released a software

The post Cisco Router Vulnerability Gives Window into Researchers’ World appeared first on The Cyber Security Place.

5 New Year’s Resolutions for Your IoT Security Strategy

A new year has arrived, and with it comes the opportunity to make all kinds of transformations to help your business. No matter how you navigated the dangerous threat landscape

The post 5 New Year’s Resolutions for Your IoT Security Strategy appeared first on The Cyber Security Place.

Pepper IoT: Smart devices aren’t so bright when it comes to security

Smart devices aren’t very intelligent when it comes to protecting user privacy and handling security, according to a report by Internet of Things platform and service provider Pepper IoT and cybersecurity

The post Pepper IoT: Smart devices aren’t so bright when it comes to security appeared first on The Cyber Security Place.

More regulation, more solutions needed: IoT device breaches continue to put user data at risk

Almost half of companies still can’t detect IoT device breaches, according to a Gemalto study. But, use of blockchain technology might provide a solution.’With IoT devices continuing to immerse themselves

The post More regulation, more solutions needed: IoT device breaches continue to put user data at risk appeared first on The Cyber Security Place.

Security in an IoT World: Your Big Data Problem is Getting Bigger

It’s that time of year for prediction articles and the number has become almost overwhelming. This year, one of the trending topics I’ve noticed is the growth in Internet of

The post Security in an IoT World: Your Big Data Problem is Getting Bigger appeared first on The Cyber Security Place.