The ABC of Cybersecurity: W is for Worm

The ABC of Cybersecurity: W is for Worm

by HOTforSecurity , on 12.08.2016

It was a cold November night just as you would expect for that time of the year in the northern part of Romania. The office that is otherwise full with reverse engineers and malware analysts is now occupied by a handful of people working the night shift, answering support tickets and monitoring the infrastructure. Suddenly, the [and#8230;] read more

Smart TV Security Concerns and 3 Ways to Stay Safe

Smart TV Security Concerns and 3 Ways to Stay Safe

by HOTforSecurity , on 12.08.2016

Smart TVs are growing in popularity, but are still in their relative infancy when it comes to easy, effective security and#8212; and with Smart TVs appearing in both homes and businesses at an unprecedented rate, thatand#8217;s a real concern. Like any internet-connected device, there is a range of potential vulnerabilities that open up as soon [and#8230;] read more

Getting executive buy-in for identity management

Getting executive buy-in for identity management

by Business Insights , on 12.08.2016

Some enterprise technology deployments can be handled entirely by IT, don’t require executive support or the cooperation of the entire organization. Identity management implementations are not one of these types of initiatives. They take dedicated and adequate budget, executive leadership, and long-term enterprise-wide dedication. So how do enterprises get the C-suite buy-in they need? read more

Bitdefender’s Honest History of Hacking is nominated for B2B Campaign of the Year

Bitdefender’s Honest History of Hacking is nominated for B2B Campaign of the Year

by HOTforSecurity , on 12.08.2016

Amazing news for Bitdefender! Bitdefender’s Honest History of Hacking project is on the shortlist at the Mand#38;M Global Awards 2016! The Mand#38;M Global Awards, now in its twenty-seventh year, celebrates the best multi-market media campaigns from around the world. This year, Bitdefender’s collaborative project with The Wall Street Journal has made the cut in the [and#8230;] read more

Ouch! Some countries might not be that excited about IoT, after all

Ouch! Some countries might not be that excited about IoT, after all

by HOTforSecurity , on 11.08.2016

Following an overall expected spending of $1.7 trillion by 2020, the IoT market is growing rapidly and unexpectedly expanding in various sectors across regions. Canada is one of the many countries which have shown exponential growth in IoT adoption, especially in the business sector, where it has been implemented to reduce expenses and increase productivity. [and#8230;] read more

Smart cities tap into the smart grid to decrease carbon dependency

Smart cities tap into the smart grid to decrease carbon dependency

by HOTforSecurity , on 11.08.2016

Following the raising interest in climate change and in decreasing carbon dependency, city leaders are implementing smart energy projects based on smart grid technology, distributed energy resources and alternative and renewable energy. Consequently, smart energy will nurture economic development and reach a revenue increase estimated at $20.9 billion in 2024, Navigant Research found. “Energy is [and#8230;] read more

IT departments embrace hybrid environments, yet CIOs lack strategies for cloud security and privacy

IT departments embrace hybrid environments, yet CIOs lack strategies for cloud security and privacy

by Razvan Muresan, from Business Insights , on 11.08.2016

As the cloud’s popularity grows, so does the risk to sensitive data. More than halfof companies in a recent survey do not have a proactive approach for compliance with privacy and security regulations for data in cloud environments, yet cloud computing is considered a priority to their organizations’ operations. read more

IoT to Become Mainstream in Africa in Two to Five Years, Gartner says

IoT to Become Mainstream in Africa in Two to Five Years, Gartner says

by HOTforSecurity , on 11.08.2016

The Internet of Things (IoT) will reach mainstream adoption in the next two to five years in Africa and is expected to have the most transformational impact on local businesses in the same period, according to Gartner. and#8220;The level of interest in, and the pace of adoption of, ICT in Africa are increasing, and, although [and#8230;] read more

Australia’s online Census form sabotaged by DoS attacks

Australia’s online Census form sabotaged by DoS attacks

by HOTforSecurity , on 10.08.2016

After the Australian Bureau of Statistics (ABS) proudly announced that two thirds of Australian citizens could fill out their census forms online for the first time, cybercriminals had a different plan. The online form was bombarded yesterday with not one but four DoS attacks in just a few hours after it was launched. After the [and#8230;] read more

The ABC of Cybersecurity: A is for Adware

The ABC of Cybersecurity: A is for Adware

by HOTforSecurity , on 10.08.2016

“If youand#8217;re not paying for it, then you are the product,” reads an old proverb. This stays true to date, despite the massive move to digital. Advertising is still a multi-billion business and it was only a matter of time until it made it as a stand-alone category of software suggestively named “adware”. Adware is [and#8230;] read more

Next >>