Is Your Baby Monitor Susceptible to Hacking?

Credit to Author: Trend Micro| Date: Wed, 17 Apr 2019 12:00:19 +0000

There’s no doubt that digital technology, in many of its forms, brings everyday tasks much closer-to-hand. From discovering breaking news, to online shopping, to keeping tabs on your home via security cameras—everything is within the touch of a button. Even so, with the growing reach of the Internet of Things (IoT), new and unsuspected threats…

The post Is Your Baby Monitor Susceptible to Hacking? appeared first on .

Read more

A Game of Risk with Broadcasters, Cyber Felons and Dragons

Credit to Author: Trend Micro| Date: Wed, 20 Feb 2019 15:21:50 +0000

Submitted by Steve Ng, Lead, Digital Platform Operations, Mediacorp Where there’s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game Dungeons & Dragons, dragons are intelligent, mythical foes defined by their fiery prowess – boasting…

The post A Game of Risk with Broadcasters, Cyber Felons and Dragons appeared first on .

Read more

This Week in Security News: Consumer Data and Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 08 Feb 2019 15:00:14 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn what security issues and critical threats will impact consumer data this year. Also, learn about a malicious Adobe app targeting macOS systems. Read on:  Keys to…

The post This Week in Security News: Consumer Data and Malware appeared first on .

Read more

This Week in Security News: Ransomware and Cyber Threats

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 25 Jan 2019 14:00:09 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about new routines for encryption of JobCrypter ransomware. Also, understand how Emotet has managed to evolve into one of the most notorious cyber threats in existence….

The post This Week in Security News: Ransomware and Cyber Threats appeared first on .

Read more

Compromising vital infrastructure: the power grid

Credit to Author: Pieter Arntz| Date: Thu, 13 Dec 2018 16:00:00 +0000

How are we doing at protecting the vital infrastructure of our power grid and its components against physical and cyberattacks?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: the power grid appeared first on Malwarebytes Labs.

Read more

How to promote cyber security inside your company

Credit to Author: Roger Casellas| Date: Mon, 19 Nov 2018 11:55:54 +0000

As business are digitizing, companies get more and more vulnerable in front of cyberattacks. The numbers are impressive: in 2025 is expected to be 75 billion connected devices. Considering that… Read more »

The post How to promote cyber security inside your company appeared first on Schneider Electric Blog.

Read more

Compromising vital infrastructure: transport and logistics

Credit to Author: Pieter Arntz| Date: Tue, 06 Nov 2018 18:05:11 +0000

Transport and logistics are vital infrastructure, because we need them to deliver our daily necessities, but who is responsible for protecting them?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: transport and logistics appeared first on Malwarebytes Labs.

Read more

Cyber-Attacks: How to Stop a Multibillion-Dollar Problem

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Mon, 05 Nov 2018 14:00:41 +0000

By Ed Cabrera, Chief Cybersecurity Officer for Trend Micro and Martin Bally, Vice President & Chief Security Officer for Diebold Nixdorf  Where there’s money, there has always been crime. Traditional bank robbery and physical assaults on ATMs are still a challenge, and now a new breed of cyber-enabled theft—using ATMs as the endpoint for cash-outs— has become a multibillion-dollar…

The post Cyber-Attacks: How to Stop a Multibillion-Dollar Problem appeared first on .

Read more

8 everyday technologies that can make you vulnerable to cyberattacks

Credit to Author: Kayla Matthews| Date: Thu, 09 Aug 2018 15:00:00 +0000

The security vulnerabilities of the latest developments in tech have been well documented. But what about everyday technologies that have been around for a while or are widely adopted? Here are eight commonly-used tech conveniences that are not as ironclad as you might hope.

Categories:

Tags:

(Read more…)

The post 8 everyday technologies that can make you vulnerable to cyberattacks appeared first on Malwarebytes Labs.

Read more