Cyber Security
Next generation industrial cyber security platform
Today the IIoT infrastructure has encountered increasing cyber security threats due to the vulnerability by the use of public networks for IT/OT convergence. This has exposed exploitable opportunities for hackers. To add confidence in industrial control system (ICS), Lanner presents LEC-6041, the next-generation industrial cyber security gateway.
Cyber criminals target iPhone users with phishing scams
A new cell phone scam targeted at iPhone users tries to steal their Apple login details by sending a fake Spotify/iTunes email. The phishing email claims to be from Apple and Spotify. If a user clicks on the link, the email says the user had bought a year of Spotify Premium for $150.99 and links to a page to ‘review your subscription’. A fake Apple landing page – which looks like a real one - then asks for log-in details.
SMEs are more likely to suffer cyber attacks than larger firms
A Government survey conducted last year, as part of the National Cyber Security Programme, revealed 46% of UK businesses experienced at least one cyber security breach or attack in 2017. Furthermore, the report also found 66% of cyber attacks occurred in SMEs, 45% occurred in micro businesses and 41% in large companies.
Will the UN act on the cyber security treaty?
Escalations in state-sponsored cyber attacks will force the United Nations (UN) to tackle the issue with a multinational Cyber Security Treaty during 2019, predicts researchers at WatchGuard Technologies’ Threat Lab.
Enterprises reveal identity-shaped holes in security programmes
SailPoint has released the 2018 Identity Report, the industry’s first benchmark. In 2017, SailPoint launched a free assessment tool to help identify areas of exposure for companies, which automatically computed an 'Identity Score' based on its results. After analysing hundreds of completed self-assessments and the correlating Identity Scores, SailPoint found that while the majority of organisations ha...
Rackmount network security with Intel Xeon Processor D-2100
Specialist in network appliances and embedded systems, IBASE Technology has announced its latest FWA8600 1U rackmount network security appliance based on the scalable Intel Xeon Processor D-2100 series and with up to 29xGbE ports. This highly scalable system is designed for managing data driven workloads and enabling robust levels of performance in enterprise network security, Unified Threat Management and WAN optimisation applications.
US consumers think government need to do more for data privacy
With the recent implementation of the General Data Protection Regulation (GDPR) by the European Union (EU) and a steady stream of news about data privacy, it’s no surprise that a SAS survey found that US consumers are increasingly concerned about their personal data. Of 525 US adult consumers surveyed, almost three-fourths (73%) said their concern over the privacy of personal data has increased in the past few years.
Blockchain security 2Go starter kit protects digital transactions
Digital transactions require secured yet user-friendly solutions. This applies all the more so for Blockchain applications where the user credentials are one of the most critical security aspects of the system. With its new Blockchain Security 2Go starter kit, Infineon Technologies has provided FinTechs and blockchain designers with a fast and easy way to build hardware-based security into their systems.
Cyber security standards for enterprise-grade mobile apps
The not-for profit membership organisation Secure Chorus has announced the completion of its first set of interoperability standards for regulatory-compliant encrypted voice calls. The move will lead the way to the commercial rollout of an ecosystem of different brand mobile apps for enterprise.
Poor security practice from producers of connected products
What happens when someone discovers a security issue in a connected product? How do security researchers and others report a security issue? To gain better visibility into the current status of vulnerability disclosure practice in consumer companies providing connected products, the IoT Security Foundation (IoTSF) commissioned a research study.