We look at the ease of use, reliability and strength of Apple's iPhone X new Face ID security feature. Should you keep your face (password) to yourself?
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Cost of cyber crime has kept on growing and the underground market is now a legitimate $114 billion economy. We need a global effort to combat this threat.
Executives concerned about secure applications but developers are not confident that they are writing secure code or the security of third party modules.
Consumer trust has taken a hit over the past year. Retailers now need to offer identity protection services to regain confidence of holiday shoppers.
Amazon Key is still in the early stages yet there are so many questions of hacking, insurance risks and liability if problems were to occur during delivery.
Researchers recently uncovered an IoT botnet that has infected more than 1M organizations. Can we survive the next DDoS attack and avoid a botnet apocalypse?
The Internet of Things is the future and it is time to start thinking privacy and security, first, and market share second.
Latest WPA2 Wi-Fi security flaw has widespread impact due to number of networked devices that must be updated, prolonging the risk of vulnerable devices.
Imperva's Q2 2017 Global DDoS Threat Landscape Report highlights a disturbing new DDoS attack trend of repeat assaults and increased assault intensity.
SMBs paid ransomware hackers more than US$301 million last year. Hackers are finding it more lucrative to prey on SMBs without ransomware protection.