Factors to Consider When Securing IoT Devices 1

Factors to Consider When Securing IoT Devices

Smart gadgets seek to make your home smarter and efficient, but you still need to buck up and learn how to secure the connected devices. Your IoT devices can add…

Read More
Printer Vulnerabilities Report Reveals Cybersecurity Risk

Printer Vulnerabilities Report Reveals Cybersecurity Risk

Quocirca, a market insight consulting firm has posted their Global Print Security Landscape 2019 report, which publicly revealed that 60% of corporate entities globally are exposed to data breach due…

Read More
Open EDR
How To Get Ready With The Unprecedented Growth Of IoT Devices

How To Get Ready With The Unprecedented Growth Of IoT Devices?

The IoT era has already begun and it can be said that it is a stage where it is rapidly expanding now, both at the homes and the enterprise space….

Read More
Cyber Warfare How to Keep Your Consumer Devices Safe

Cyber Warfare – How to Keep Your Consumer Devices Safe

According to the 2019 Cyber Threat Outlook published by defense industry firm Booz Allen Hamilton, the year 2019 is likely to see an increase of state actors taking aim at…

Read More
Hackers Enslaving More and More Smart Home Networks

Hackers Enslaving More and More Smart Home Networks

The name given to smart home devices may actually be a misnomer given the findings of Netscout, a security research firm. According to the researchers, hackers are increasingly using the…

Read More
Securing Internet of Things Is Not Rocket Science

Securing Internet-of-Things Is Not Rocket Science

In our current year 2018, we have witnessed the smartphone and tablet markets both plateauing. It is fairly difficult for a typical mobile device manufacturer to continue increasing their sales…

Read More
Mirai Botnet New Variant Takes Aim at x86 Linux Servers

Mirai Botnet New Variant Takes Aim at x86 Linux Servers

A new variant of the Mirai botnet now takes aim at the x86 Linux servers in enterprise networks. It was just a couple of years ago that the chaotic Mira…

Read More
New Botnet That Targets Cloud Servers for DDoS Attacks

New Botnet That Targets Cloud Servers for DDoS Attacks

Bad news for those who use Hadoop for data analytics…there’s a new botnet out there that’s targeting Hadoop clusters seeking to perform DDoS attacks. (Hadoop, which is an open source…

Read More
Blackberry In the IoT Security Game

Blackberry In the IoT Security Game

The Blackberry has lost the smartphone game, in fact, they are trying to rebuild their smartphone using Android for at least a couple of years now. But the used to…

Read More
The Risks of Different Sectors with Embracing Internet of Things Devices

The Risks of Different Sectors with Embracing Internet-of-Things Devices

Internet-of-Things devices are set to follow the success of the smartphones and tablets when it comes to successful penetration of both individual and corporate lives. However, the fast adoption of…

Read More

Page 2 of 3

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register