Study: most enterprise IoT transactions are unencrypted
Of the millions of enterprise-Internet of Things transactions examined in a recent study, the vast majority were sent without benefit of encryption.
Of the millions of enterprise-Internet of Things transactions examined in a recent study, the vast majority were sent without benefit of encryption.
Aurora, the planned Department of Energy supercomputer, will be three powers of 10 faster than the current fastest supercomputer when it is delivered to Argonne National Laboratory in 2021.
In a move that IBM says will make it the world’s leader in hybrid cloud, the company says it’s going to buy open-source giant Red Hat for US$34 billion, banking on what it sees as Red Hat’s potential to become the operating system of choice for cloud providers.
Tips on protecting computers against WannaCry and remediating ones already infected.
Hospitals across England have fallen victim to what appears to be a coordinated ransomware attack that has affected facilities diverting patients to hospitals not hit by the malware.
Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks.
Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and more resources to public cloud providers.
Cloud security startup RedLock comes out of stealth mode today with a service that helps defend business resources that reside in pubic clouds, gives customers visibility into how these resources are being used and stores records of that activity for auditing and forensics.
A new ransomware-for-hire scheme called Fatboy adjusts the ransom it charges based on international exchange rates so it’s more likely the victims get hit for the largest amount they can reasonably pay.
A range of alternative authentication methods could spell end for passwords
The U.S. Air Force is seeking vetted hackers to probe its public Web sites while a top Pentagon official is considering a similar program to test sensor networks used for HVAC and other physical systems.
The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated some high-profile websites last fall, leading some to think the internet had been broken.
The Travelers insurance company is offering free risk assessment advice from Symantec as a way to help lower their liability and get lower premiums.
Synack gets $21.25 million in Series C funding from Microsoft, HPE and Singtel to hire more white-hat hackers and expand its territory.
Industrial control systems (ICS) that run the valves and switches in factories may suffer from inherent weaknesses that cropped up only after they were installed and the networks they were attached to became more widely connected.