ESET researchers discover a previously unreported cyberespionage platform used in targeted attacks against diplomatic missions and governmental institutions, and privacy-concerned users. ESET researchers have discovered a new espionage platform with a complex architecture, a host of measures to make detection and analysis more difficult and two notable features. First, its GSM plugin uses the AT … More ESET discovers Attor, a spy platform with curious GSM fingerprinting
If you have had tech connectivity issues you may have heard the IT security team say, “that’s a firewall issue”, so what is a firewall and how does it work? As its name would suggest, the term originates from a structure that prevents the spread of a fire, such as emergency fire exits. In old … More Why do IT Security experts refer to firewalls?
A reflection on whether this approach to addressing IoT security challenges can ‘deliver the goods’ and how consumer awareness can help. According to an article by the BBC, the United Kingdom’s Digital Minister Margot James is proposing legislation to introduce a new labelling system to show customers how secure an IoT product is. In order to … More The UK plans to legislate to secure IoT, but is it really the answer?
Streaming media feature among services that take the spotlight in a report on credential-stuffing attacks in 2018. Hackers made 30 billion attempts last year that involved testing out purloined or leaked login details en masse in a bid to invade other people’s online accounts, reads a report by content delivery network provider Akamai. In automated attacks called … More Credential-stuffing attacks behind 30 billion login attempts in 2018
How can smaller businesses address their cybersecurity risks without the resources of large organizations? There are a lot of challenges to being a small-business owner, including safely managing technology. Every risk can have an outsized effect on your ability to stay in business. And resources for protecting your business are often geared towards much larger … More Cybersecurity resources for smaller businesses
Some tips that businesses can do to get better at it without breaking the bank. Here at RSA Small and Medium Businesses (SMBs) are squarely faced with the daunting task of securing the explosion of IoT devices, now ever-present in the business environment. In the past, IoT in a business setting could largely be ignored, but that’s no … More RSA – IoT security meets SMB
In our final report from CES we take a look at smart city initiatives. This year at CES there was an entire section devoted to smart city initiatives municipalities are rolling out in many cities around the world, or planning to. As we noted in our look at automotive security and IoT securitypreviously, the technologies surrounding transportation are converging; … More Smart cities and the challenge of securing the neighborhood