Why hardware configurations could be the downfall of the IoT
Credit to Author: Trend Micro| Date: Thu, 23 Mar 2017 16:16:22 +0000
Ignoring the configurations of your IoT devices puts your business at risk, making it important to secure your systems appropriately.
The 10th anniversary of Pwn2Own just successfully completed as the Zero Day Initiative spent $833,000 acquiring 51 different 0-day bugs. The event was filled with drama as vendors released their security patches the day before the contest, causing a number of entries to pull out immediately. Over the next three days, five additional entries would…
If you’ve ever bought anything online, checked your bank accounts through the app, or logged on to your favorite social media network, you’ve used a technology called SSL/TLS. The S in HTTPS. SSL/TLS (just to keep it simple, I’ll refer to as SSL) is the technology used to encrypt the communication between your browser and…

