Explained: the strengths and weaknesses of the Zero Trust model

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Read more

The little-known ways mobile device sensors can be exploited by cybercriminals

Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.

Read more

A week in security (November 18 – 24)

A roundup of cybersecurity news from November 18 – 24, including Coalition against stalkerware, exploit kits, ransomware, data leaks, and juice jacking.

Read more

IoT bills and guidelines: a global response

IoT laws and guidelines abound, as we take a look what’s happening around the world in the name of securing Internet-connected devices.

Read more

Vital infrastructure: securing our food and agriculture

Food and agriculture is one of the biggest verticals and one that reaches almost everyone of us. So why do we never hear about cybersecurity in this sector? We need to talk!

Read more

15,000 webcams vulnerable to attack: how to protect against webcam hacking

We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.

Read more

Facial recognition technology: force for good or privacy threat?

It seems facial recognition technology, as technology so often does, has raced far ahead of our ability to define its ethical use. We take a hard look at major concerns brewing in cities around the world.

Read more

8 ways to improve security on smart home devices

Smart home devices aren’t the most secure, but they do make life more convenient. How can those who’ve embraced smart home tech stay as secure as possible? Here are eight ways.

Read more

A week in security (June 24 – 30)

A roundup of cybersecurity news from June 24–30, including top malicious web campaigns, updates on the GreenFlash Sundown exploit, a Malwarebytes initiative to double down on stalkerware detection and awareness, and more.

Read more

A week in security (June 17 – 23)

A roundup of security news from June 17–23, including Android attacks, IoT mishaps, cities under fire from ransomware, and much more.

Read more

Select your language