How To Simplify The Complicated IoT | Avast
Around the world, the millions of internet-connected gifts we exchanged over the holidays have been set up, making our homes “smarter.” And less secure.
Around the world, the millions of internet-connected gifts we exchanged over the holidays have been set up, making our homes “smarter.” And less secure.
A hacker recently leaked a list of more than a half-million Telnet credentials for servers, home routers, and smart devices, leaving them vulnerable to attack. Marko Zbirka, an Internet of Things threat researcher at Avast, answered key questions relat…
Cybersecurity researchers have noticed a rise in several new phishing scam strategies in which attackers are successfully outsmarting current spam filters. One of these tactics is conversation-hijacking, a more involved method than simple spamming. It …
What happened?
You probably heard that Microsoft officially stops support for Windows 7 on Jan. 14th 2020. If you are running the popular operating system, your computer will still function but Microsoft will no longer provide technical support for any issues, softwa…
It’s a pressure cooker for the IT and security channel today — a threat landscape that serves up constant surprises, tighter customer budgets, solution complexity requiring even more time, and then that thing called the “margin.”
Hack Cambridge, the University of Cambridge’s annual hackathon, will soon bring together 300 hackers from universities all over the world. For 24 hours on Jan. 18-19, they will build, break and innovate to produce projects that push the boundarie…
Expecting retaliation for the U.S. assassination of Iranian Gen. Qasem Soleimani, the Cybersecurity and Infrastructure Security Agency (CISA), which is a branch of the Department of Homeland Security, has dispatched a notice informing businesses across…
Generating consistent, recurring revenue and finding new ways to continuously provide value to customers is something that many IT providers struggle with.
The new year is a time for reflecting on the old and considering the new. In cybersecurity, this leads to a prediction-fest where vendors tell us what to expect over the next 12 months.