Cybercriminals, and perhaps nation-state hackers, that are attempting to take advantage of the COVID-19 pandemic are now turning their attention to mobile devices to spread malware, including spyware and ransomware, security researchers warn.
As a result of the COVID-19 outbreak, cybercriminals increasingly are targeting organizations that now have more remote workers and fewer IT and security staff at the ready to mitigate hacker attacks and intrusions, security experts say.
It's no exaggeration to say that, in the midst of the COVID-19 pandemic, we now have the largest-ever global remote workforce. And with it comes an expanded attack surface that requires extra attention. Phil Reitinger of the Global Cyber Alliance shares five tips for securing the remote workforce.
A two-week analysis of nearly 500 million transactions from more than 2,000 organizations revealed 553 different IoT devices from 212 manufacturers.
A new report by ThreatLabZ, the research division of Zscaler, sheds light on the meteoric rise in IoT traffic in the enterprise, from data collection terminals to...
President Donald Trump has signed legislation that bans telecommunication firms from using federal funds to buy equipment from companies that are deemed a "national security threat" and provides funding for "rip and replace." The measure takes aim at Chinese firms Huawei and ZTE.
To help deal with the coronavirus outbreak, healthcare providers are examining how to implement or expand the use of telehealth services to remotely evaluate and care for patients. But these providers need to carefully consider privacy and security issues as they work to quickly offer these services.
The latest edition of the ISMG Security Report discusses the developing definition of "Insider Risk." Plus, Former DHS Secretary Michael Chertoff on U.S. 5G rollout plans; Cloud Security Alliance on containers and microservices.
Federal regulators say newly identified cybersecurity vulnerabilities dubbed "SweynTooth" could pose risks to certain internet of things devices, including wearable health gear and medical devices, as well as "smart home" products from vendors who use Bluetooth Low Energy, or BLE, wireless communication tech.
In response to White House warnings that 5G infrastructure equipment built by Huawei could be subverted by China to conduct espionage, Andy Purdy of Huawei Technologies USA says his company has pledged full transparency and urges competitors to follow suit.
Device visibility remains a daunting challenge for the modern enterprise. Forescout provides a multifaceted information technology (IT) and operational technology (OT) platform designed to solve visibility challenges for the modern enterprise by providing complete device discovery and classification, risk assessment,...
With the rise of automation, remote access, and the ever-expanding Internet of Things (IoT), IT and OT teams are collaborating at an unprecedented rate to strengthen organizational network security. Business operations that rely on machinery and physical processes are no longer disconnected from the world.
Amazon's Ring is mandating the use of two-factor authentication for all users, a move designed to help stop creepy takeovers of the web-connected home security cameras. A passcode will be sent to a user's email address or by SMS.
The U.S. Justice Department has filed new charges against Huawei and several of its subsidiaries, plus its CFO, accusing them of engaging in a conspiracy to steal trade secrets from American companies.
As the U.S. ramps up pressure on its allies to ban equipment from Chinese manufacturer Huawei from their 5G networks, U.S. officials now say they have evidence that the firm has created a backdoor that allows it to access mobile phone networks around the world, the Wall Street Journal reports.