There’s a flood of connected devices making their way into our homes and businesses.
From mobile, wearables and car technology to advancements in smart homes, TVs and cameras, the tech world is awash with internet-connected devices. By 2020, it’s estimated that there will be more than 30 billion connected devices in the world – more than four times the earth’s population.
Hackers are Watching
Tech-hungry consumers keep their eyes peeled for major device announcements. Also watching are (...)
Accueil > Mots-clés > afficher un article sur la home > affiche
affiche
Articles
-
Hot New IoT Devices – a Prime Target for DDoS Cyber Attacks
6 August 2018, by Ronald Sens, Director, EMEA Marketing at A10 Networks -
Sébastien Sivignon, CEO de Cyblex Technologies : CUSTOCY détecte les attaques les plus sophistiquées
23 novembre 2022, par Marc JacobCyblex Technologies est un éditeur sur le marché de la cybersécurité, basé à Labège. Forte de 14 personnes aujourd’hui cette start up vient de lever 3 millions d’euros en 2022. Cyblex Technologies vient de lancer le 3 novembre dernier sa solution NDR (Network Detection & Response) CUSTOCY : une plateforme de détection d’intrusion réseau. Sébastien Sivignon, CEO de Cyblex Technologies considère que sa nouvelle solution se positionne sur le marché des solutions Network Detection & Response, pour contribuer à la protection du patrimoine digital des entreprises en détectant les attaques les plus sophistiquées et notamment celles inconnues (zero-day).
-
Sending Phishing Emails from PayPal
27 July 2022, by Check PointIn June, we wrote about how hackers were sending phishing emails directly from QuickBooks. It worked like this: A hacker would create a free account in QuickBooks. They would create a spoofed invoice, either for Norton or Microsoft, and then send it to the user.
Since it’s created in QuickBooks, the email comes across as legitimate. Email scanners see a legitimate QuickBooks domain. Since QuickBooks is on most Allow Lists as a legitimate site, the email passes right through. We call this (...) -
Is it Becoming Easier for Cybercriminals to Access Company Data?
7 August 2018, by Ashraf Sheet, regional director, Middle East and Africa at InfobloxWe are in the age of the ‘office of the future’, every company now battles it out to attrait staff and clients by having the most fun office, with the newest gadgets and apps. This has seen countless consumer toys become ‘business critical equipment.’ But has our love for consumer technologies made this the easiest time for cybercriminals to hack businesses?
In a word, yes. At Infoblox we recently conducted a Shadow IoT research report, entitled ‘What is lurking in your network’, that found (...) -
Matrix: 7 Benefits of having an Automated Visitor Management System
1 January 2018, by MatrixThere is no doubt in the fact that most organizations attract large number of visitors. Modern, growing businesses are always concerned with keeping their physical and logical data secure. Depending on a few security guards and sign-in sheets doesn’t ensure security of your premises. Gone are the days when registers were used for visitor sign-in process. When considering premises protection, it is important to get a security system that can provide security throughout the premises (...)
-
Governmental Institutions Around the World Fail to Protect Their Citizens’ Data Why Aren’t Authorities Capable of Protecting Your Data?
3 September 2019, by Daniel Markuson, the digital security expert at NordVPNMore and more governments around the world are discussing encryption backdoors to help them fight various criminal activities. However, the data breaches, hacks, and cyberattacks, which we hear about every day, affect not just private companies. Governmental institutions suffer from them too. Due to various software system flaws, millions of unsuspecting citizens have been affected only this year.
Daniel Markuson, the digital privacy expert at NordVPN, says that some governmental (...) -
GDPR - Costly Restriction or New Business Opportunity?
12 December 2017, by Talal Wazani, Manager Strategic Security Consulting at Help AGThe Middle East’s lack of understanding of the upcoming EU regulation is likely to place businesses across a wide range of sectors including cloud services, banking and finance, healthcare, insurance and tourism at significant risk.
© Jelica Videnovic
While VAT compliance is currently top of mind for Middle East businesses, many are unaware of the implications of the General Data Protection Regulation (GDPR). The European Union (EU) regulation aims at strengthening and unifying data (...) -
CERTs européens : retour d’expériences de ces urgentistes de la cybersécurité
28 janvier 2014, par Emmanuelle LamandéLes CERTs sont des acteurs fondamentaux de la stratégie de cybersécurité nationale. Urgentistes de la cybersécurité, ils interviennent sur le terrain et développent une expertise au plus près de la menace. Toutefois, ces plateformes de confiance et de partage informatif s’avèrent spécifiques selon le pays dans lequel ils opèrent et dans leur façon de collaborer avec leurs pairs. Plusieurs CERTs européens ont accepté de partager leurs expériences à l’occasion du Forum International de la Cybersécurité. (...)
-
prpl Foundation Releases First Ever Global Smart Home Security Report
29 September 2016, by prpl FoundationThe non-profit prpl Foundation unveiled its global study on the use of smart devices in a domestic setting entitled, “The prpl Foundation Smart Home Security Report.” The one-of-a-kind study, which was conducted through OnePoll, covers the proliferation of smart device use and security within the home. It surveyed 1,200 respondents across the US, UK, France, Germany, Italy and Japan to discover the measures people take to secure their smart homes and their attitudes about the security of (...)
-
Analysis by Itzik Kotler CTO of Security Art
31 March 2011, by Marc JacobAt October 1987, a DOS file virus was detected in Jerusalem, Israel. The virus, known as “Jerusalem” contained one destructive payload that was set to go off on Friday the 13th, all years but 1987. On that date, the virus deletes every program file that was executed. In April 26, 1999 a Microsoft Windows computer virus called CIH (aka. Chernobyl) payload was delivered for the first time. CIH is one of the most damaging viruses, overwriting critical information on infected system drives, and (...)