IT threat evolution in Q2 2021. PC statistics
PC threat statistics for Q2 2021 contain data on miners, encrypting ransomware, financial malware and threats to Windows, macOS and IoT. Continue reading IT threat evolution in Q2 2021. PC statistics
Collaborate Disseminate
PC threat statistics for Q2 2021 contain data on miners, encrypting ransomware, financial malware and threats to Windows, macOS and IoT. Continue reading IT threat evolution in Q2 2021. PC statistics
As of this year, there are more than 10 billion active IoT devices all over the world, many of which are deployed in enterprises. Keeping those devices secure is of the utmost importance, lest they be a way in for attackers, so it’s imperative that org… Continue reading A remedial approach to destructive IoT hacks
Ordr released a report on the state of connected devices. The 2021 study addresses pandemic-related cybersecurity challenges, including the growth of connected devices and related increase of security risks from these devices as threat actors took adva… Continue reading Connected devices increasingly at risk as new ransomware attacks are reported almost daily
In the first half (H1) of 2021, ransomware attacks skyrocketed, eclipsing the entire volume for 2020 in only six months, according to the mid-year update to the SonicWall report. In a new paradigm for cybercrime, SonicWall is analyzing how threat actor… Continue reading Ransomware attacks skyrocketed in H1 2021
Digital forensics research last month fell fairly neatly into two categories, each of which sought to solve bigger problems in the field. In the first category is ensuring quality via frameworks such as service levels, better supporting first responder… Continue reading Research Roundup: Problem Solving In Digital Forensics
Digital forensics research last month fell fairly neatly into two categories, each of which sought to solve bigger problems in the field. In the first category is ensuring quality via frameworks such as service levels, better supporting first responder… Continue reading Research Roundup: Problem Solving In Digital Forensics
Application programming interfaces (APIs) are at the core of nearly every digital experience – whether that is the delivery of mobile apps that enable consumers to monitor and personalize their exercise routines using an IoT connected device, or … Continue reading Ignore API security at your peril
The next wave of Internet of Things (IoT) analytics development will fully converge with the big data domain. Simultaneously, the value in the technology stack is shifting beyond the hardware and middleware to analytics and value-added services, such a… Continue reading IoT ML and AI services to reach $3.6 billion in 2026
Zscaler released a study examining the state of IoT devices left on corporate networks during a time when businesses were forced to move to a remote working environment. The report analyzed over 575 million device transactions and 300,000 IoT-specific … Continue reading IoT malware attacks rose 700% during the pandemic
The ETSI committee on Methods for Testing and Specifications (TC MTS) has recently completed a first set of seven standards addressing the testing of the IoT MQTT and CoAP protocols, and the foundational security IoT-Profile. “These new standards fill … Continue reading ETSI completes set of IoT MQTT and CoAP testing standards