Security

SecurityTrendMicro

Back to Basics: Why We Need to Encourage More Secure IoT Development

Credit to Author: Mike Gibson| Date: Wed, 22 Aug 2018 12:05:33 +0000

The Internet of Things (IoT) is radically reshaping the way we live and work. Before our very eyes, organizations are becoming more agile, efficient and cost effective to run, all while consumers marvel at the wonders of the smart home, fitness trackers and connected cars. There’s just one major problem: Much of this new infrastructure…

The post Back to Basics: Why We Need to Encourage More Secure IoT Development appeared first on .

Read More
MalwareBytesSecurity

The digital entropy of death: BSides Manchester

Credit to Author: Christopher Boyd| Date: Tue, 21 Aug 2018 15:58:16 +0000

What happens to online accounts when we die? Not a cheerful subject by any stretch of the imagination, but one we covered at BSides Manchester.

Categories:

Tags:

(Read more…)

The post The digital entropy of death: BSides Manchester appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (August 13 – 19)

Credit to Author: Malwarebytes Labs| Date: Mon, 20 Aug 2018 17:33:18 +0000

A round up of the security news from August 13 – 19, including an in-depth discussion of what drives the average cybercriminal to crime.

Categories:

Tags:

(Read more…)

The post A week in security (August 13 – 19) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

The enemy is us: a look at insider threats

Credit to Author: Jovi Umawing| Date: Mon, 20 Aug 2018 16:42:50 +0000

It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. Who are the insider threats to organizations? And how can they be stopped?

Categories:

Tags:

(Read more…)

The post The enemy is us: a look at insider threats appeared first on Malwarebytes Labs.

Read More