Search Results | Malware
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...77 NEXT
Sort by:  Most Relevant  |  Date
Securing your supply chain is as important as securing your devices

Blog  The Ponemon Institute published its annual report on third-party IoT risks in May, 2019. The report focused on identifying what companies do not know -- or understand -- about the risks inherent to IoT devices and applications, particularly when used by third parties. The report drives home the fact...

Last updated: Oct 9, 2019   6:35 PM GMT  |  Blog: IoT Agenda   |      cybersecurity, Internet of Things, iot
Who has control of your control systems?

Blog  Cybercriminals are constantly probing consumer IoT devices such as home routers, IP cameras and printers to find access points into the network. Once they have access, they can disrupt network functions, gather critical information and deliver malicious payloads. At the other end of the spectrum, cy...

Last updated: Oct 4, 2019   5:10 PM GMT  |  Blog: IoT Agenda   |      cyber-attacks, Internet of Things, iot
Five ways a managed print service can support cyber resilience

Blog  As IoT devices, smart MFPs are susceptible to the growing threat of attempts to implant malware, recruit to botnets (to help perpetrate DDoS attacks), as well as potentially providing an open gateway to the corporate network.A managed print service (MPS) is an effective approach to building a mult...

Last updated: Oct 4, 2019   1:45 PM GMT  |  Blog: Quocirca Insights
Medical IoT devices lead to patient safety concerns

Blog  With the recent publicized ransomware and cyberattacks, medical device security has become a hot topic in the boardroom. Senior management is not only concerned about sensitive patient data being leaked. Patient safety is now also at risk. The organizational challenges of securing medical devices Co...

Last updated: Oct 2, 2019   8:57 PM GMT  |  Blog: IoT Agenda   |      cyber-attacks, healthcare IoT, Hospitality technology
Secure the mix of legacy and modern solutions in IIoT

Blog  Logistics today is governed by a set of principles called the seven Rs: the right product, the right customer, the right price, the right quantity, the right condition, the right place and the right time. Upholding these principles demands a Herculean effort. Luckily, logistics managers have some he...

Last updated: Sep 20, 2019   9:06 PM GMT  |  Blog: IoT Agenda   |      Cyberattacks, IIoT, IIoT network
How Has Cyber Security Evolved in the Last 10 Years

Blog  The last ten years of cyber security have taught us a lot about hackers and their resilience to infiltrate some of the biggest companies in the world. Common mistakes continue to occur, such as Instagram account passwords being held in text format, and regular Internet users continue to fall for phi...

Last updated: Sep 9, 2019   5:20 AM GMT  |  Blog: SAS 70
7 cybersecurity tips for small business

Blog  Many small business owners misguidedly feel their organization is too small to become a target for hackers however, cyberattacks on small companies are typical and they're increasing. An effective attack on a Fortune 500 firm is likely to be a lot more rewarding, but much tougher. Small companies ar...

Last updated: Sep 3, 2019   3:48 AM GMT  |  Blog: SAS 70
Input validation issues open Cisco firewall vulnerability

Blog  Standard security practices are the baseline for any product, and even the most junior software developers should be aware of the minimum security requirements for any project. And yet, something as simple as a lack of input validation still plagues the industry. For example, a firewall vulnerabili...

Last updated: Aug 29, 2019   8:38 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
ransomware

Blog  Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access is returned to the victim. Continued... Quote of the Day "The catastrophic capabilities of ransomware attacks on pu...

Last updated: Aug 22, 2019   7:28 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Top four considerations when securing the multi-cloud environment

Blog  This is a guest post byStephen Dane, managing director for cyber security at Cisco Asia-Pacific, Japan and Greater China We live in a multi-cloud world. A world where a multitude of offerings from cloud service providers (CSPs) gives us the potential to respond to business opportunities and chall...

Last updated: Aug 22, 2019   7:28 AM GMT  |  Blog: Eyes on APAC
Defending Industrial IoT the truth lies in the data

Blog  Self-driving cars and smart medical equipment, once the stuff of science fiction, are a fact of life in today's digital, connected world. Network infrastructure connects devices in virtually every industry, making life more convenient and more productive for us all. But how safe is a future where ba...

Last updated: Jul 31, 2019   4:36 PM GMT  |  Blog: IoT Agenda   |      IIoT, IIoT analytics, IIoT security
deep packet inspection (DPI)

Blog  Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continued Quote of the Day "DPI enables IT administrators and security officials to set policies and enforce them at all layers, including the application and user layer, to help combat malware and othe...

Last updated: Jul 17, 2019   5:32 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
How Safe Is Your Enterprise Backup Data from Malware Attack? @asigra

Blog  How many CIOs and CTOs can surely claim that their enterprise backup that is being taken regularly is not contaminated with any kind of Malware. A recent report published by DCIG features cybersecurity approaches from the legends in the field like Asigra, Rubrik, and Dell. Detecting and preventing m...

Last updated: Jul 10, 2019   4:28 PM GMT  |  Blog: Quality Assurance and Project Management   |      Asigra, Backup and restore, Backup Recovery and Media Services
Security controls must keep pace with internet-connected devices

Blog  The ability to connect devices is becoming the standard across all facets of technology. We are seeing this in everything from smart cities to tea pots and toasters. New IoT devices are popping up daily, rapidly adding to the 23 billion that already exist. These devices are designed for availability...

Last updated: Jul 8, 2019   6:59 PM GMT  |  Blog: IoT Agenda   |      Cyber security, Cyberattacks, Internet of Things
IoT security and the new branch office

Blog  IoT is now an integral part of every networked environment, from corporate headquarters to the home network. Branch offices and retail locations have been adopting IoT at a breakneck pace, using these devices to provide a wide range of services, while using SaaS cloud servers as their management int...

Last updated: Jun 26, 2019   6:51 PM GMT  |  Blog: IoT Agenda   |      Branch Office, branch security, Internet of Things
New Cloud Daddy CEO aims to 'tell the world' about AWS protection

Blog  The new CEO of AWS data protection provider Cloud Daddy is looking to tell his company's story and drastically increase its customer count. "We've got to get people to know about Cloud Daddy," said Spencer Kupferman, the former president and CEO of reporting and automation platform provider Global ...

Last updated: Jun 21, 2019   12:46 AM GMT  |  Blog: Storage Soup   |      Cloud Backup
Security concerns remain a drag on the internet of things

Blog  Concerns about security continue to hinder the adoption of IoT devices. Enterprise customers indeed are interested in buying more IoT devices, but only if vendors can provide better security for them. Bain & Company conducted research into the attitudes of enterprise buyers about cybersecurity ...

Last updated: Jun 20, 2019   2:57 PM GMT  |  Blog: IoT Agenda   |      built-in security, embedded security, Internet of Things
malware

Answer  is there a malware on mobile devices specifically on android that can leak all of your photos in a site?

Last updated: Jun 14, 2019   1:44 AM GMT   |    , Android phones, malware
How to deal with a remote code execution vulnerability

Blog  Visual Studio Code is a free source code editor developed by Microsoft for Windows, Max OS and Linux. On February 12, 2019 Symantec Security Center found a serious remote code execution vulnerability (CVE-2019-0728) in MS Visual Studio Code. This vulnerability ties into another one back in June of 2...

Last updated: Jun 10, 2019   3:31 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions   |      Uncategorized
How to have a safe connected cyber summer

Blog  Summer means vacations and down time. People are booking hotels, arranging travel or settling in at the beach with the digital version of a summer novel. For many families, the kids are home from school and permanently wired in to an array of connected devices. So, along with the sunscreen and bug s...

Last updated: Jun 7, 2019   5:20 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT cybersecurity
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: