After breach, researcher reveals CloudPets toy can be used to spy on kids
Anyone can connect to a CloudPets toy as long as they're in Bluetooth range.
Anyone can connect to a CloudPets toy as long as they're in Bluetooth range.
The removal of administrator rights and imposition of application control policies can stop ransomware dead in its tracks, new research from CyberArk Labs has found as a number of security players become more confident in their ability to block ransomware infections before they cause damage.
David Braue | 03 Aug | Read more
Google’s score-based system that it hopes will replace passwords for apps should be available to all Android developers by the end of the year.
A more than doubling of Internet of Things (IoT) usage in 2015 has seen Verizon bring forward its projections around the segment's growth, highlighting security fears around the emergent technology with businesses only starting to take advantage of the data they are collecting from IoT devices.
David Braue | 06 Apr | Read more
Strong adoption of hybrid application models reflects corporations' growing appetites for change but security remains a serious concern in the infrastructure refresh, according to a new survey of Australian IT professionals in which only 1 in 3 respondents said they have enough skills and resources to manage the change.
David Braue | 05 Apr | Read more
No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties -- outside vendors, contractors, affiliates, partners and others.
Taylor Armerding | 30 Jun | Read more
A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.
Antone Gonsalves | 18 Jun | Read more
CSOs need to take a number of steps as soon as possible to protect their organizations against the OpenSSL vulnerability that has shaken the tech industry, experts say.
Antone Gonsalves | 10 Apr | Read more
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
Kristin Burnham | 25 Apr | Read more
Midsized companies with revenues from $100 million to $1 billion spent an average of $3 million on information security as of 2014 per "The Global State of Information Security Survey 2015" from PwC.
David Geer | 18 Aug | Read more
Security experts and users follow a drastically different set of best practices to protect their security online, according to a new report from Google.
Kristin Burnham | 12 Aug | Read more
230 million patients. 3,300 hospitals. 900,000 healthcare professionals. 98 percent of U.S. pharmacies. More than 700 different electronic health record platforms. 764 million medication histories. 6.5 billion transactions processed last year alone.
Maria Korolov | 17 Jul | Read more
"Caveat emptor" - buyer beware - is the most common warning to those shopping for big-ticket items. That, apparently, applies in spades to buying cyber insurance.
Taylor Armerding | 10 Jul | Read more
If the probability of your assets being prodded by attackers foreign and domestic doesn't scare the bejesus out of you, don't read this article. If you're operating in the same realm of reality as the rest of us, here's your shot at redemption via some solid preventive pen testing advice from a genuine pro.
David Geer | 07 Jul | Read more
A majority of IT organizations are experiencing significant changes that impact the requirements for their distributed branch networks. Mobility, cloud-based applications, and Internet of Things (IoT) are altering traffic flows and increasing bandwidth requirements. Employees and guests expect Internet connectivity, which means that employee-facing and IoT devices need reliable, low latency access to their data and applications, and must be securely on-boarded as they interact with centralized services. IT organizations do not have the level of control they once did with traditional architectures, and now face increasing pressure to support these new initiatives even as budget and resources remain lean.