We look at how successful hardware hacks can damage devices—and potentially even put lives at risk.
This week on Lock and Code, we talk to JP Taggart, senior security researcher at Malwarebytes, about the Internet of Things.
Several countries are introducing a cybersecurity labeling scheme to inform consumers about the security features of IoT devices and force manufacturers to improve these features.
Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.
Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.
Food and agriculture is one of the biggest verticals and one that reaches almost everyone of us. So why do we never hear about cybersecurity in this sector? We need to talk!
We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.