It's reckoned that by 2020 three-quarters of new cars shipped globally will have some form of internet connectivity.
How to check if you're vulnerable to the Logjam hack attack
Worried that you're vulnerable to Logjam, the latest hack that that lets attackers steal private information via your browser? Here's how to check whether you're at risk, and what Logjam does.
GhostHook Attack Targets Windows 10 Vulnerability
CyberArk Labs demonstrated an attack that can enable the installation of rootkit malware under Windows 10 64-bit
How to Manage Attacks, Vulnerabilities & Complexities in APIs
Webinar exploring how to adopt a proactive ‘monitor and respond’ approach to prevent API exploitation
10 Major Reasons Small Businesses Are Still Vulnerable To Malware Attacks
We have seen firsthand the common errors and oversights that lead to infections and intrusions – and we want to help your business learn from those mistake
Webinar: Modern Day DDoS Attack, How Vulnerable is Your Organization?
A CCSI and Arbor Networks Webinar June 27th, 2017 at 11:30-12:30 EDT Join CCSI and Arbor Networks for this informative webinar. Tom Bienkowski, Director of Product Marketing from Arbor, will be discussing the complexity of the modern day DDoS attack, which is commonly a dynamic combination of volumetric, TCP state exhaustion and application layer attack vectors. Making matters worse, DDoS attacks have evolved to weaponize the…
Bleedingbit: Critical vulnerabilities in BLE chips expose millions of access points to attack
If exploited, Bleedingbit vulnerabiltiies allow an unauthenticated attacker to break into enterprise networks undetected, take over APs, spread malware.
A vulnerability in both the Bigscreen virtual reality app and the Unity game development platform on which it’s built makes it possible for hackers to
How Vulnerable are You to Cyber Attack?
How vulnerable are you to cyber attacks? Practical questions for any organization to consider for reducing their vulnerability.
Googlers' Epic Hack Exploits How Memory Leaks Electricity
Google's hack shows a fundamental flaw in basic computer hardware that could be impossible to fully patch in existing vulnerable computers.
Why Healthcare Is Particularly Vulnerable To The Next Ransom Attack
Ransomware is hitting the healthcare field more frequently than any other industry. Find out why.
Why the game industry is still vulnerable to DDoS attacks
The game industry has been under attack for a long time. Security professionals have often had to deal with distributed-denial-of-service (DDoS) attacks going back years. It seemed like the problem…
Ransomware attacks: What makes healthcare most vulnerable
The NHS cyber-attack should be treated as a wake-up call for organisations around the world, particularly, the health sector.
The ransomware problem: Why SMBs are vulnerable to attack
The increased ransomware detections observed recently suggest that it has become a highly lucrative business for hackers targeting SMBs.
Why Health Care Is Especially Vulnerable to Ransomware Attacks
The global WannaCry cyber attack highlights a frightening reality.
How vulnerable is your organization for a DDoS attack?
DDoS attacks are back in the news, and your organization could be vulnerable to a variety of DDoS attacks from hackers across the globe. Avoiding DDoS attacks requires more than a simple firewall or antivirus program, and not being prepared could be devastating to your organization. If you’re questioning whether or not your organization …
Vulnerable to attack: Businesses should boost cyber defenses
NEW YORK (AP) - When cyberthieves attacked Empire Industries' computer network, technology manager Rich Shemanskis could see files in the process of being infected by malicious software "We were looking at the network, and I noticed it, and another guy noticed it. We're looking at the files and watching them change," Shemanskis recalls about the attack three years ago Shemanskis told staffers to quickly shut down…
Cyber Attacks: What Makes Me Vulnerable?
Returning from a trip to Italy, a retired couple was alarmed to find their telephone answering service full of messages from frantic friends: "Are you OK? Please call right away. What can we do to help?"
Cyber Attacks: What Makes Seniors Vulnerable?
More than a third of U.S. seniors (38 percent) surveyed say someone has tried to scam them online, and 28 percent have downloaded a computer virus, according to research conducted by Home Instead, Inc., franchisor of the Home Instead Senior Care® network.
Why U.S. Grid Still Vulnerable to Cyber Attack
The factors that render the electrical grid vulnerable to cyber attack are strikingly similar to the cyber risk issues faced by health care, financial services, and other industries. But one recent malware campaign targeting utilities shows just how exposed the grid remains to cyber threats.