Intelligent IoT Vulnerability Scanner for communication service providers launched to assess and predict cybersecurity risks
Dojo by BullGuard, a provider of IoT security platform for Communication Service Providers (CSPs), has launched the Dojo Intelligent IoT Vulnerability Scanner for CSPs. Designed as an easy-to-use, free app for customers, the Dojo Intelligent Scanner is powered by the Dojo IoT Security Intelligent Platform (DIP), a…
How Mirai spawned the current IoT malware landscape
When, in late 2016, US-based DNS provider Dyn suffered a massive DDoS attack that it resulted in the temporary unavailability of many popular online services, the name of the Mirai malware became instantly known outside the cybersecurity industry. Since then, we’ve come to know the…
Operation Prowli Profits On Weak IoT Devices, Servers
A malicious campaign has compromised more than 40,000 machines globally, carrying out traffic-hijacking and cryptomining. Researchers at Guardicore Labs, who called the campaign Operation Prowli, said it targets a variety of platforms – including Drupal CMS websites, WordPress sites, backup servers running HP Data Protector,…
Russia asks Apple to remove Telegram Messenger from the App Store
Russia’s communications regulator Roskomnadzor has threatened Apple to face the consequences if the company does not remove secure messaging app Telegram from its App Store. Back in April, the Russian government banned Telegram in the country for the company’s refusal to hand over private encryption…
AT&T and Aira announce global agreement to unlock IoT for good
AT&T and Aira extend their agreement as Aira made AT&T its global data provider as it begins to take the service to Australia, Canada and the U.K. This comes at a meaningful time. Today marks the 7th Global Accessibility Awareness Day (GAAD). The purpose of GAAD is to get everyone…
Watch out. North Korea keeps getting better at hacking
WASHINGTON — In the latest indication that North Korea’s cyber operations are more sophisticated than commonly realized, computer security researchers have identified a group of government hackers and spies in the hermit kingdom who are capable of stealing documents from computers that aren’t connected to…
Sqreen wants to become the IFTTT of web app security
French startup Sqreen recently launched a Security Hub with dozens of plugins to put you in control of the security of your web app. In many ways, it feels like enabling tasks on popular automation service IFTTT. Sqreen participated in TechCrunch’s Startup Battlefield and Y…
Buckhacker : search engine to find servers that can be hacked
BuckHacker: A search tool that allows you to search leaky Amazon Web Services servers The lives of hackers has just been made a lot easier, thanks to a tool created by anonymous hackers that allows security researchers and cybercriminals to search for sensitive information stored…
IoT ramps up cyber security risk, says in-depth report
A new report finds that most organisations lack the right mix of strategy and execution to tackle rising threats to cybersecurity. And the Internet of Things (IoT) is a growing part of the problem. Chris Middleton presents some solutions. What keeps business people awake at…
Singapore Ministry of Defence Concludes Successful Ethical Hacking Program
Singapore Ministry of Defence Concludes Successful Ethical Hacking Program The Singapore Ministry of Defence (MINDEF) today announced the results of the first MINDEF Bug Bounty Challenge, which was facilitated by HackerOne, the leading hacker-powered security platform. The three-week program invited 300 ethical hackers to penetrate…
Stay connected