article thumbnail

Podcast: Can we fix IoT security?

Webroot

For others, home networks are simply hosting more devices as smart doorbells, thermostats and refrigerators now connect to the internet. Security experts warn that while the internet of things (IoT) isn’t inherently a bad thing, it does present concerns that must be considered.

IoT 91
article thumbnail

CSC Research Finds Third Parties Continue to Lay Groundwork for Malicious Activity Among Thousands of COVID-Related Domains

CyberSecurity Insiders

Many of these web domains can pose threats to brands and consumers due to their registration patterns and behaviors. This research is part of CSC’s latest report, “ Two Year Analysis: The Impact of COVID-19 on Internet Security and Safety. At CSC, we believe domain security intelligence is power.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat. Cloud security success and choosing the right investments is all about having a clear understanding of threat types and their resulting damages.

article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

BEC remains a very lucrative business; the Internet Crime Complaint Center (IC3) got 19,369 BEC complaints in 2020, resulting in adjusted losses of $1.8 Get the full story on these details and more in the 2021 Webroot BrightCloud® Threat Report. Even malware (for the moment) is trending gently downward.

article thumbnail

IDS & IPS Remain Important Even as Other Tools Add IDPS Features

eSecurity Planet

Intrusion detection system (IDS) and intrusion prevention system (IPS) technologies – often combined as intrusion detection and prevention (IDPS) – have been in use for decades, yet they remain important cybersecurity tools even in the face of today’s rapidly changing cyber threats and complex IT environments.

Firewall 109
article thumbnail

What a difference a year makes, or does it?

Webroot

We began even more to rely on the internet as a conduit to the world. Is the threat landscape more of the same? With the right combination of backup, training and protection, businesses can collectively create a comprehensive and integrated approach to tackle evolving threats. 2020 was a year of immense change.

article thumbnail

Episode 157: Do we need an FDA for Software? Also: operationalizing Threat Intelligence

The Security Ledger

Sarah Zatko of the Cyber Independent Testing Lab joins us to talk about CITL's big new study of firmware security. On Firmware Security: Nobody’s Trying. Since then, attacks on Internet of Things devices have grown rapidly. On the Internet of Things, however, things are different. Read the whole entry. »