Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications?

Bluetooth security is not strong enough to keep fraudsters from eavesdropping on sensitive communications. The upcoming Bluetooth 5 offers enhancements.

The post Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications? appeared first on Security Intelligence.

Continue reading Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications?

Mirai Evolving: New Attack Reveals Use of Port 7547

Cybercriminals recently discovered how to modify the Mirai botnet source code, which leaked in September, to compromise devices remotely via TCP port 7547.

The post Mirai Evolving: New Attack Reveals Use of Port 7547 appeared first on Security Intelligence.

Continue reading Mirai Evolving: New Attack Reveals Use of Port 7547

The Indian IoT Market Is Exploding Despite Gaping Security Holes

The rapid growth of the Indian IoT market is encouraging, but more connected devices mean more vulnerabilities for cybercriminals to exploit.

The post The Indian IoT Market Is Exploding Despite Gaping Security Holes appeared first on Security Intelligence.

Continue reading The Indian IoT Market Is Exploding Despite Gaping Security Holes

Lessons From the Dyn DDoS Attack

Domain name provider Dyn suffered the largest DDoS attack in history on Oct. 21. DDoS is nothing new, but the attack highlights some alarming trends.

The post Lessons From the Dyn DDoS Attack appeared first on Security Intelligence.

Continue reading Lessons From the Dyn DDoS Attack

How Will the Internet of Things Be Leveraged to Ruin Your Company’s Day? Understanding IoT Security

The Internet of Things is here to stay. Despite the market’s rapid growth and the high level of risk, many companies still neglect IoT security.

The post How Will the Internet of Things Be Leveraged to Ruin Your Company’s Day? Understanding IoT Security appeared first on Security Intelligence.

Continue reading How Will the Internet of Things Be Leveraged to Ruin Your Company’s Day? Understanding IoT Security

Coffee Break With Colleagues? Cream, Sugar and Two Spoonfuls of IoT Security

When you huddle around the coffee machine at work or flip on your smart kettle at home, do you consider the security of the Internet of Things (IoT) devices you are using? If you’re like most, IoT security is probably the last thing on your mind. Today it is more and more likely that these […]

The post Coffee Break With Colleagues? Cream, Sugar and Two Spoonfuls of IoT Security appeared first on Security Intelligence.

Continue reading Coffee Break With Colleagues? Cream, Sugar and Two Spoonfuls of IoT Security

Hackers take Remote Control of Tesla’s Brakes and Door locks from 12 Miles Away

Next time when you find yourself hooked up behind the wheel, make sure your car is actually in your control.

Hackers can remotely hijack your car and even control its brakes from 12 miles away.

Car hacking is a hot topic.

Today many automobiles comp… Continue reading Hackers take Remote Control of Tesla’s Brakes and Door locks from 12 Miles Away

Data Sabotage: The Serious Security Risk of Smart Cities

Smart city technology is on the rise, bringing more efficient ways to administer city services. But the new threat of data sabotage also looms.

The post Data Sabotage: The Serious Security Risk of Smart Cities appeared first on Security Intelligence.

Continue reading Data Sabotage: The Serious Security Risk of Smart Cities

Are Fitness Bands Secure? There’s More to It Than Just the Clasp!

Cybercriminals can easily compromise fitness bands that use Bluetooth 4.0 VLE due to limitations in the key exchange of its encryption protocol.

The post Are Fitness Bands Secure? There’s More to It Than Just the Clasp! appeared first on Security Intelligence.

Continue reading Are Fitness Bands Secure? There’s More to It Than Just the Clasp!