;
  1. Home
  2. IoT Security

Category: IoT Security

IoT Security
The lurking danger of hacked email reply chains

The lurking danger of hacked email reply chains

Although phishing has been around in various forms since the 1990s, recent news has shown that it continues to evolve – and remains a major threat. These days, phishing tactics are so sophisticated it can…

IoT Security
PII capturing websites still applying poor security measures one year after GDPR

PII capturing websites still applying poor security measures one year after GDPR

One year after the EU General Data Protection Regulation (GDPR) went into effect, 1 in 10 PII capturing websites belonging to the top 10 UK financial services organizations are still doing so without adequate security…

IoT Security
Mobile carriers believe security and reliability concerns will increase with 5G

Mobile carriers believe security and reliability concerns will increase with 5G

Mobile service providers anticipate significant new revenue opportunities from the coming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they also believe much-improved security will be essential to realizing…

IoT Security
New Strain of Android Malware Found on Third-Party App Store

New Strain of Android Malware Found on Third-Party App Store

Researchers at Zscaler have reported on one of these third-party app stores: Smart Content Store, available via sexy.smartcontentstore[.]com and games.smartcontentstore[.]com, and offering new and updated apps. But Smart Content Store doesn’t deliver standard Android apps…

IoT Security
Next Generation Cyber Security. Your powerful protection on the Internet.

Next Generation Cyber Security. Your powerful protection on the Internet.

G DATA Internet Security combines our strongest antivirus technologies in one solution. For the best protection while on the Internet. Without compromise. Attacks during online banking and shopping, dubious websites, suspicious e-mails? No problem. Just…

IoT Security
Putin signed the law on the isolation of the Russian Internet (Runet)

Putin signed the law on the isolation of the Russian Internet (Runet)

On May 1, Putin signed a law on the isolation of the Runet. Thus, Russia will have its own Internet. And it will happen this year. Roskomnadzor (The Federal Service for Supervision of Communications, Information…

IoT Security
Will the next cyberattack be in the hospital?

Will the next cyberattack be in the hospital?

What’s your stereotype of a hacker: a malicious millennial intent on hijacking your computer, deleting your files and demanding a ransom? A corporate criminal stealing sensitive data from Sony or Yahoo? Or a rogue programmer…

IoT Security
Breach Force: Cisco to Cybersec Colombians, Accellion Pushes to Secure GDrive, BYOD Woes + more

Breach Force: Cisco to Cybersec Colombians, Accellion Pushes to Secure GDrive, BYOD Woes + more

(MENAFN – PRLog) The cybersecurity industry is massive, generating over $100 billion in revenue, yet security providers struggle to eliminate breaches on behalf of their clients. Cyber losses cost the global economy an estimated $1.5…

IoT Security
The Internet of Things Signal Transmission Challenges

The Internet of Things Signal Transmission Challenges

The Internet of Things (IoT) is a quite fast growing landscape and it’s so important to understand why its safety and security matter. That technology would be vitally dependable on the internet connectivity, so if…

IoT Security
IoT Devices Are Vulnerable Against Botnets, Urges PureVPN

IoT Devices Are Vulnerable Against Botnets, Urges PureVPN

IoT & Cyber Threats There’s certainly no shortage of IoT related attacks in today’s cybersecurity landscape. Every year a new variant of malware is reported to be involved in the attacks. The proliferation of IoT devices has also given…