By Maxwell Donovan, BestOnlineReviews.com
Passwords are essential. They are the only way that gives you a direct ticket to various sites any time you want to. However, only understanding and observing the basics of password protection is not enough for you to keep hackers away for good? Over just the basics protections such as two-factor authentication, password manager and of course ensuring that your password is secure from being easily guessed by hackers. These are valuable tips for protecting your online security. However, you still need to go an extra mile beyond the standard. Here are a few tips from experts to ensure your online security is not compromised. Continue reading
Unfortunately, it is fair to say that the vulnerabilities of Internet of Things (IoT) are preceding its innovations and utilities. From the hacking of the Ukraine power grid, to last year’s DDoS attack against the Dyn DNS provider, IoT devices are behind security incidents of all sizes.
The IoT industry is exposing how putting connectivity into anything and everything opens up a Pandora’s box of vulnerabilities, and give cybercriminals limitless ways to hurt their victims. One area of concern are smart homes, where a slew of not-so-secure devices are finding their way and exposing their owners to unprecedented threats.
In this month’s interview, Leon Kuperman, CTO of smart firewall manufacturer CUJO, discussed IoT security threats and new approaches to securing the homes of the future. Continue reading
By Heather Redding
Today tech enthusiasts around the world appreciate the growing importance of 3D printing. This breakthrough technology has rapidly expanded beyond simple prototype creation and hobby design efforts to transform mainstream manufacturing processes. Currently, 3D printers assist with the production of numerous products, ranging from sophisticated medical devices to car parts and complex aviation components. Rapid advances in 3D manufacturing capabilities promise to augment cost-effective fabrication processes in a rapidly increasing number of industries in the near future.
Yet despite the fast pace of innovation, this nascent field has also begun to attract some potential cybersecurity threats. Understanding unique security challenges implicated by this technology will likely assist many progressive firms in optimizing their 3D printing processes. This brief article seeks to outline some possible 3D printing cybersecurity issues and suggest some potentially useful solutions. Continue reading
Last Tuesday, a malware, initially suspected to be the Petya ransowmare, spread across thousands of computers, mostly in Ukraine. At first, the episode was thought to be the sequel to the WannaCry ransomware outbreak that infected hundreds of thousands of computers across the world in May.
But as the story unfolded and the details emerged, it became evident that this attack was something more, perhaps a cyberattack of political nature hidden behind the guise of a ransomware. The malware eventually acquired other names, including NotPetya, PetyaWrap and ExPetr.
Here’s what we know—so far—about the NotPetya “ransomware” attack that has been making the headlines of late. Continue reading
By Karen Mesoznik, SaferVPN
What You Should Know About Public Wi-Fi
Usually when you’re preparing for an upcoming trip, your mind runs through the usual concerns and questions: “What vaccinations do I need?” “Is my passport up-to-date?” “What do I need to keep my cash and cards safe?” But if there’s one more travel habit you should have, or precaution you should take, it’s staying safe over public Wi-Fi.
Today, public Wi-Fi at airports, hotels and cafes, is a lot like water at a restaurant – it’s an expectation, not a gift, a commodity, not a luxury. But what if the restaurant you went to poured you a glass of unclean water? Water that ended up making you very, very sick?
Think of unsecured public Wi-Fi as tainted water waiting to pollute your personal data, internet privacy and online identity. Continue reading
Yes, this is going to be another rant about the state of insecurity in the Internet of Things industry. But a good one.
Every once in awhile, I hear someone explain this most critical issue, which has been at the heart of so many security incidents in the past year, in a new, inspiring way. And I feel compelled to unpack and explain it for those who might have missed the important parts.
I had one of those moments of epiphany in this year’s TNW Conference, when Mikko Hypponen, the acclaimed cybersecurity expert from Finnish vendor F-Secure, delivered a speech titled “The Internet of Insecure Things.”
In the speech, Hypponen brushed upon some very interesting topics, including ransomware and IoT security. But there’s only so much you can pack into a 20-minute speech. Here are the key takeaways about IoT security. Continue reading
By T Roy, IoT Defense Inc.
One of the most common questions we get from potential customers, at least from the more technically minded ones is – I don’t have any open ports on my home router, do I still need the protection offered by a smart firewall? This question is based on the assumption that if a home Wi-Fi router does not have any open ports, no unsolicited traffic from the internet can access the router and hence it cannot be compromised by malicious actors on the internet.
In this article, we will describe some of the functionality provided by home routers, understand the security implications of such functionality, provide some context around the above assumption and arrive at some interesting conclusions. Continue reading