Explosive technology and 3D printers: a history of deadly devices

We look at how successful hardware hacks can damage devices—and potentially even put lives at risk.

Read more

Lock and Code S1Ep10: Pulling apart the Internet of Things with JP Taggart

This week on Lock and Code, we talk to JP Taggart, senior security researcher at Malwarebytes, about the Internet of Things.

Read more

End of line: supporting IoT in the home

Warranties which may not warranty, certificates which might fail to certify, lifespans which don’t match the length of cover promised. This could be IoT.

Read more

Cybersecurity labeling scheme introduced to help users choose safe IoT devices

Several countries are introducing a cybersecurity labeling scheme to inform consumers about the security features of IoT devices and force manufacturers to improve these features.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Read more

The little-known ways mobile device sensors can be exploited by cybercriminals

Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.

Read more

A week in security (November 18 – 24)

A roundup of cybersecurity news from November 18 – 24, including Coalition against stalkerware, exploit kits, ransomware, data leaks, and juice jacking.

Read more

IoT bills and guidelines: a global response

IoT laws and guidelines abound, as we take a look what’s happening around the world in the name of securing Internet-connected devices.

Read more

Vital infrastructure: securing our food and agriculture

Food and agriculture is one of the biggest verticals and one that reaches almost everyone of us. So why do we never hear about cybersecurity in this sector? We need to talk!

Read more

15,000 webcams vulnerable to attack: how to protect against webcam hacking

We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.

Read more

Select your language