Remove IoT Remove Mobile Remove Risk Remove Social Engineering
article thumbnail

Brits Ban Default Passwords — and More IoT Stupidity

Security Boulevard

The post Brits Ban Default Passwords — and More IoT Stupidity appeared first on Security Boulevard. The UK’s Product Security and Tele­comm­uni­cations Infra­struc­ture Act aims to improve the security of net-connected consumer gear.

IoT 135
article thumbnail

Sophisticated Attacks Against Mobile Devices Surge 187%

SecureWorld News

In today's interconnected world, mobile devices have become an integral part of our lives, enabling seamless communication, productivity, and access to sensitive information. However, as reliance on mobile technology grows, so does the risk of cyber threats targeting these devices.

Mobile 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Social Engineering: Investigate the human element of cybersecurity by exploring social engineering techniques and tactics used to manipulate individuals. Mobile Security: Research the unique security challenges posed by mobile devices, including app vulnerabilities, data leakage, and mobile malware.

article thumbnail

26 Cyber Security Stats Every User Should Be Aware Of in 2024

Security Affairs

Generative AI Impact : Generative AI will have a big role in cyber security, especially in areas like email protection and fighting social engineering attacks. Mobile Threats: Mobile devices are increasingly targeted by cyber criminals, with mobile malware attacks rising by 54%.

article thumbnail

Mobile security advances to stopping device exploits ? not just detecting malicious apps

The Last Watchdog

With our affiliations and preferences put in play by search engines and social media, we’re perfect patsies for social engineering. Related article: Is your mobile device spying on you? And now we are on the verge of making matters dramatically worse as smartphones and IoT devices proliferate.

Mobile 182
article thumbnail

ENISA 2023 Threat Landscape Report: Key Findings and Recommendations

Thales Cloud Protection & Licensing

Attackers exploit the geopolitical environment and use AI-powered tools to create convincing deepfakes, disinformation campaigns, and social engineering attacks. The report notes that these attacks can have significant implications for democratic processes, social cohesion, and national security.

article thumbnail

Cheap Video Doorbell Cams: Tools of Stalkers and Thieves

Security Boulevard

EKEN IoT FAIL: Amazon, Sears and Shein still sell security swerving stuff. The post Cheap Video Doorbell Cams: Tools of Stalkers and Thieves appeared first on Security Boulevard.

IoT 130