Web application vulnerabilities are often caused by application design flaws and misconfigured web servers. They can be particularly easy targets…
Browsing: IoT Security
5G is here to replace not just legacy cellular standards, but a multitude of other wireless and wired communication standards…
Geopolitical tension has a long-tail effect in cyberspace. In the aftermath of major political or military incidents, beneath the public…
GPRS Tunneling Protocol (GTP) is a 2.5G technology that provides interconnect between various network interfaces, enabling mobile users to roam…
(ISC)² Opens Call for Expert Cybersecurity Speakers for 2020 Security Congress Annual conference brings together experts from around the world…
Connectivity as a concept has become an essential part of life, as opposed to just a luxury. The Internet of…
All Internet of Things and consumer smart devices will need to adhere to specific security requirements, under new government proposals. The aim…
Whether it is an EPOS system at a fast food venue or large display system at a public transport hub,…
Ransomware attacks in the UK are on the rise, how can local governments best prepare for the eventuality of a ransomware…
It seems as everyone as their dog is dishing out predictions, I thought it’s about time I threw my hat…