How To Get Ready With The Unprecedented Growth Of IoT Devices

Prerequisites of IoT Security: Software, Network, Physical

IoT Security focuses on protecting networks and connected devices in the Internet of Things. For the readers who are new to IoT, it is a system of connected computing devices,…

Read More
IoT capable Printers Becoming Unofficial Gateways For Cyber Attacks

IoT- Capable Printers Becoming Unofficial Gateways For Cyber Attacks

The printer started as a simple device for printing on paper, providing users with a physical copy of their documents. However, this past decade, a printer even at home became…

Read More
Open EDR
Edge Computing and Its Relation To IoT

Edge Computing: What Is It And Its Relation To IoT?

When the Internet protocol was conceived by the team of Vint Cerf in the ‘70s, they have decided that the Arpanet (the first name of the Internet) will never exceed…

Read More
New Hacking Technique Using Bluetooth Exposed

New Hacking Technique Using Bluetooth Exposed

Bluetooth makes it easy to transfer files, photos, and documents to devices, such as mobile phones, PDAs, and laptops in a short distance. This wireless communication protocol was developed in…

Read More
D Link agrees to Security Assessment to Settle FTC lawsuit

D-Link agrees to Security Assessment to Settle FTC lawsuit

D-Link has agreed to make some security enhancements that have reorganized the company’s security platform to resolve disputes from the Federal Trade Commission (FTC) because it has misinterpreted the security…

Read More
A New Malware Called Silex Targets IoT Devices

A New Malware Called Silex Targets IoT Devices

A hacker named Light Leafon, who claimed to be 14, was responsible for a new IoT worm called Silex, which targets any system that looks like UNIX when trying to…

Read More
Security Privacy Concerns in IoT Devices

Security & Privacy Concerns in IoT Devices

Today in the IoT era, both competing systems and services are streamlined in various areas of the world, and new businesses are emerging from the ground up. In turn, whether…

Read More
Emotet 1

Emotet Trojan Now Uses IoT And Router Devices To Evade Detection

The Emotet malware has been frequently covered here in Hackercombat since July last year. It is not uncommon for a cyber security-centered website to discuss most if not all of…

Read More
Belkin Wemo Insight Smart Plug Vulnerability Remains Exploitable 1

Belkin Wemo Insight Smart Plug Vulnerability Remains Exploitable

If you own a smart home, then you may probably be aware of Belkin Wemo Insight smart plug. Yes, it helps you to turn off your lights and appliances, and…

Read More
UAE Emerge To Be The Favorite For IoT Infiltration

UAE Emerges To Be The Favorite For IoT Infiltration

At first glance, having IoT (Internet-of-Things) devices makes our lives easier and more convenient. Imagine today of not able to watch streaming videos from a 65-inch TV in the living…

Read More

Page 1 of 3

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register