The Danger and Opportunity in 5G Connectivity and IoT

The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world. Continue reading The Danger and Opportunity in 5G Connectivity and IoT

Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home

As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it’s crucial to establish network security policies for your home IT just as you would at work.

The post Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home appeared first on Security Intelligence.

Continue reading Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home

MDM Brute Forced

via Sean Gallagher, writing at Ars Technica, comes this particularly unfortunate news for Apple Inc. (Nasdaq: AAPL) MDM (Mobile Device Management) bits – especially considering there will be a flood of new devices into many orgs. On the plus side, the… Continue reading MDM Brute Forced

Teardown Of USB Fan Reveals Journalists’ Lack Of Opsec

Last month, Singapore hosted a summit between the leaders of North Korea and the United States. Accredited journalists invited to the event were given a press kit containing a bottle of water, various paper goods, and a fan that plugs into a USB port.

Understandably, the computer security crowd on Twitter had a great laugh. You shouldn’t plug random USB devices into a computer, especially if you’re a journalist, especially if you’re in a foreign country, and especially if you’re reporting on the highest profile international summit in recent memory. Doing so is just foolhardy.

This is not a story …read more

Continue reading Teardown Of USB Fan Reveals Journalists’ Lack Of Opsec

Don’t Be Held for Ransom: Five Strategies to Secure Healthcare Data Against Cyberattacks

Basic best practices, such as backing up data, patching vulnerable systems, segmenting networks, whitelisting apps and training employees, are the keys to protecting healthcare data from ransomware.

The post Don’t Be Held for Ransom: Five Strategies to Secure Healthcare Data Against Cyberattacks appeared first on Security Intelligence.

Continue reading Don’t Be Held for Ransom: Five Strategies to Secure Healthcare Data Against Cyberattacks

iOS: The Trust Jacking Gambit

Roy Iarchy, writing at Symantec’s security blog, comes this story of Apple Inc.’s (Nasdaq: AAPL) iOS, Operating System flaws, and the vector – the TrustJacking gambit, all wrapped up in a nice tidy package. Bad news for iOS, good news for Security ven… Continue reading iOS: The Trust Jacking Gambit

Are Enterprises Ready to Introduce Smart Assistants in the Workplace?

The introduction of smart assistants into the workplace is inevitable, and while they do carry unique risks, they are no more severe than the risks associated with widely deployed IoT devices.

The post Are Enterprises Ready to Introduce Smart Assistants in the Workplace? appeared first on Security Intelligence.

Continue reading Are Enterprises Ready to Introduce Smart Assistants in the Workplace?

Are Enterprises Ready to Introduce Smart Assistants in the Workplace?

The introduction of smart assistants into the workplace is inevitable, and while they do carry unique risks, they are no more severe than the risks associated with widely deployed IoT devices.

The post Are Enterprises Ready to Introduce Smart Assistants in the Workplace? appeared first on Security Intelligence.

Continue reading Are Enterprises Ready to Introduce Smart Assistants in the Workplace?

France Proposes Software Security Liability For Manufacturers, Open Source As Support Ends

It sometimes seems as though barely a week can go by without yet another major software-related hardware vulnerability story. As manufacturers grapple with the demands of no longer building simple appliances but instead supplying them containing software that may expose itself to the world over the Internet, we see devices shipped with insecure firmware and little care for its support or updating after the sale.

The French government have a proposal to address this problem that may be of interest to our community, to make manufacturers liable for the security of a product while it is on the market, and …read more

Continue reading France Proposes Software Security Liability For Manufacturers, Open Source As Support Ends

Why Device ID May Not Be Enough to Stop Fraud

To defeat increasingly sophisticated fraudsters, security teams should pair their fraud detection tools with a device ID spoofing mechanism that automatically adapts to new threats.

The post Why Device ID May Not Be Enough to Stop Fraud appeared first on Security Intelligence.

Continue reading Why Device ID May Not Be Enough to Stop Fraud