Are You Patching Your IoT Devices?

We all know about the importance of applying regular vulnerability updates to our servers, PCs, laptops, and personal devices. But what about our smart devices? As the Internet of Things becomes ever more widespread, our friendly devices can potentially be turned against us. Hacking cars gets most attention, but other …

Read More »

Dormant Intel Vulnerability Gaining Exposure

The last 48 hours have seen a spate of announcements from major vendors, including Lenovo, relating to a remote exploit vulnerability affecting remote management subsystems on Intel motherboards, previously reported by semiaccurate.com and updated here. If your IT estate has Intel platform hardware, and the chances are that this is …

Read More »

Smart Building Risk Profile Increasing?

Today’s connected, Internet-of-Things-enabled smart buildings are making lives better on a daily basis: more comfortable to work in, more energy efficient, and even more cost-effective to run as facilities management teams are able to identify and address smaller problems before they become major issues. This is a market valued by …

Read More »

New Challenges in the Safety of Industrial Control Systems

The technological differences between IT systems and industrial process systems, which have traditionally been treated as completely different disciplines, are disappearing. We find ourselves in a new scenario where both worlds coexist, and where it is no longer enough to rely on the proprietary nature of such technologies. A security …

Read More »

Red Team: The Best Defense Is a Good Offense

In order to protect business from increasingly numerous and more sophisticated targeted threats, it is necessary to change mentality and evolve towards a more offensive approach that brings greater benefits on a defensive level. Performing realistic intrusion simulations where an external team, the Red Team, simulates the techniques, tactics, and …

Read More »

GitHub Users Targeted by Malware

Apart from cost, a great attraction of open-source software is the very fact that it is open–you may inspect the code for malicious content and determine whether or not you’re comfortable including it in your project. That’s a lot of work, though, and many people don’t do it, taking on …

Read More »