Cyber Security
Public cloud-based attacks dominate threat landscape
Imperva has launched the Cyber Threat Index, a monthly report and measurement of the global threat landscape based on data from Imperva sensors across the globe.
Flash drive-sized single-board computer
Cyber security provider F-Secure’s hardware security professionals have created a new version of the USB armory, a single-board computer on a USB stick built from the ground up to be secure. The USB armory Mk II entrenches security in its lowest levels and is suitable for a wide range of applications, such as custom hardware security modules, and licensing tokens, that need the efficiency and flexibility of an embedded computer without sacr...
Duo partner to deliver cyber security for IoT devices
Telit has announced its partnership with Sternum, the multilayered cyber security solution providing real time embedded protection for IoT devices. Sternum’s solution can be built into Telit’s xE910 module family to give Telit’s customers in-depth visibility and security for their entire device fleet.
Data Privacy Day: make your business more secure
Data privacy is important all year long. But since January 28th is the Data Privacy Day, it can be a good reason to review your current situation and strengthen the protection. Here are five suggestions on how to take better care of your information online.
Collaboration ensures security for smart meters in South-Korea
Silex Insight and Argo have announced their collaboration for delivering a solution for security-conscious smart meters designers incorporating security IP from Silex Insight into the ASIC chip from Argo. The first customer of this collaboration is a power company in Korea with annual delivery of three million new and re-installed meters.
Enhanced user experience for contactless payments
Infineon Technologies’ new 40nm generation of security chip solutions – the SLC3x – is based on a design concept that provides performance and scalability for a vast array of smart card applications. Smart card manufacturers and payment solution providers will benefit from a family architecture based on the de-facto industry standard ARM, as well as innovative logistic concepts.
Security fears put young people off using virtual assistants
Whilst the future of virtual and voice assistants lies in being able to help consumers with banking, purchasing products online or customer service issues, concerns about being hacked and data privacy are shared by the majority of young Brits, new research released by Maintel has revealed. Over a third (37%) of 18-24 year olds currently use a voice assistant such as Amazon’s Alexa, Apple’s Siri ...
The most common hacking methods per industry
More than half of UK businesses have reported cyber-attacks in 2019. And recent threats to Britain’s nuclear industry proves no-one is safe. Is each industry susceptible to a certain type of hacking? Specops Software sought to find out. Individuals from a range of sectors were asked whether they/their company had experienced a cyber-attack in the past five years (or since launch).
Major vulnerabilities in popular wireless presentation system
Consultants with cyber security provider F-Secure have discovered several exploitable vulnerabilities in a popular wireless presentation system. Attackers can use the flaws to intercept and manipulate information during presentations, steal passwords and other confidential information, and install backdoors and other malware.
Which industries are best equipped to prevent cyber attacks?
In an increasingly connected world, no industry - or user of technology - is immune from threats from malicious online actors. Using its Attacker Resistance Score methodology, Synack has identified the industries best protected (and most at risk) from cyber attacks.