article thumbnail

New year's resolution for IoT vendors: Start treating LANs as hostile

Network World

In November, researchers from cybersecurity firm Invincea reported a vulnerability that could have allowed hackers to infect Belkin WeMo smart plugs with malware. The flaw was located in a configuration protocol that worked over the local area network and didn't require any authentication.

LAN 87
article thumbnail

Ransomware Exponentially Increasing as IoT Provides Physical Targeting Opportunities

CTOvision

This article increases awareness for organizations seeking to enhance their digital risk posture against the increasing threat of ransomware (a type of malware) deployed by threat actors to prevent or limit users from accessing their system until a ransom is paid. million in 2015 to 638 million in 2016. Crystal Lister.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Security and Windows 10 Will Cross Paths for Enterprises

CTOvision

1 area of spending increase in 2015, with nearly half (46%) planning to invest more in access control, intrusion prevention, and virus and malware protection. Multi-factor authentication for both cloud-based accounts and on-premise Active Directory will now be part of Windows, rather needing a hardware solution to complete.

Windows 150
article thumbnail

Security attacks and countermeasures

Cloud Musings

The resulting breaches occur primarily through malware, including Trojan horses, adware, worms, viruses and downloaders [6]. Malware is malicious software created for egregious objectives. Malware is intended to be quiet and hidden as it enters environments and is executed. Most Active Malware Today.

Security 159
article thumbnail

5 Cybersecurity Need-to-Knows When Preventing Expensive Data Breaches

CTOvision

43 percent of the phishing campaigns launched in 2015 targeted small businesses. A good mobile security protocol should include: Updated anti-malware software on all mobile devices. Strong password authentication or biometric identification. Small businesses also need to be concerned. Encrypted communication through a VPN.

Data 272
article thumbnail

8 Ways to Ensure Security of Your eTextbook As a Publisher

Kitaboo

User Authentication. The easiest way to protect your digital content is by putting user authentication to it. This kind of authentication mechanism ensures the tightest level of security for accessing your digital textbook. . Another benefit of the PDF format is that it saves your files from viruses and malware attacks. .

article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

Spanning a wide range of malicious activities from destructive malware and denial of service attacks, to the theft of intellectual property and even espionage, cyber threats pose a significant risk to any business. In recent years, multiple high-profile, high-impact breaches have raised awareness of the cyber threat.

How To 150