Japan to probe citizens’ IoT devices in the name of security

Smart devices were targeted by more than one-half of cyberattacks detected in the country in 2017. Japan has approved a plan to test the security of around 200 million Internet-of-Things (IoT) devices in the country in a bid to beef up their cyber-resilience, according to a report by Japan’s public broadcaster NHK World. Armed with lists … More Japan to probe citizens’ IoT devices in the name of security

Google’s data charts path to avoiding malware on Android

How much higher are the odds that your device will be exposed to malware if you download apps from outside Google Play or if you use one of Android’s older versions? Google has the numbers. You need to stick to Google Play for apps and run as recent a version of Android as possible if … More Google’s data charts path to avoiding malware on Android

Virus Bulletin 2018: Supply chain hacking grows up

Striking the balance between supply, demand and safety is a major concern. With the pressure to ship as early as possible, especially when it comes to hardware, what assurances do we have that the hardware is really clean, and that future updates won’t be hacked? Here at Virus Bulletin 2018, the conversation of how to … More Virus Bulletin 2018: Supply chain hacking grows up

An acoustic attack can blue screen your Windows computer

Security researchers have demonstrated how attackers could cause physical damage to hard drives, and cause PCs to crash, just by playing sounds through a computer’s speaker. A denial-of-service (DoS) attack against your organisation’s website is bad enough, preventing customers from reaching your online presence and perhaps preventing you from processing new orders – but imagine the chaos … More An acoustic attack can blue screen your Windows computer

How to start analyzing the security of your IoT devices

Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because … More How to start analyzing the security of your IoT devices