For every cyber-villain looking to exploit software and hardware vulnerabilities, there’s a cyber-hero fighting to expose (and close) those same security flaws. That reporting process is called responsible disclosure. But in today’s complex cyber landscape, the rules of responsible disclosure can vary dramatically. Begging the question, should the industry be standardizing this … [Read more...]
Major Cybersecurity Concerns for 2017 – Experts Weigh In
It’s 2017 and it’s safe to say that cybersecurity will continue to be a major concern for businesses, governments and the general public this year. As factors like the election, nation-state hacking and new advanced threats contribute to uncertainty about the future of the industry, a recent CSO Online article presented security predictions for 2017 from top vendors and … [Read more...]
Six Ways Hackers Can Use Your Selfies Against You
When was the last time you posted photo on Instagram, Facebook or Twitter? Chances are, it’s been less than a week. Although sharing images on social media platforms is a fun way to visually engage with your network, you might not realize that these posts can also offer cybercriminals an opportunity to gather information they can use against you. In his latest column on … [Read more...]
Your IoT Home Protection Idea Could Be Worth $25,000
The topic of poorly protected Internet of Things (IoT) devices is nothing new – remember the Dyn IoT botnet attack in October? To address the insecurity of connected devices and the rise in IoT attacks, the U.S. government is looking to the public for some help. The Federal Trade Commission (FTC) has launched a new IoT Home Inspector Challenge with a prize of $25,000 … [Read more...]
111 Billion New Lines of Software Code – What Could Go Wrong?
It’s estimated that there are 111 billion lines of new software code generated by developers each year – a staggering figure. But unfortunately, research from the U.S. Department of Homeland Security shows that 90 percent of reported security incidents are the result of exploits against defects in the design or code of software. Houston, we have a secure code … [Read more...]