Funding/M&A
Venture Capital and private equity investment firm Insight Partners has agreed to acquire IoT security firm Armis in a cash deal valuing the firm...
Hi, what are you looking for?
The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.
Venture Capital and private equity investment firm Insight Partners has agreed to acquire IoT security firm Armis in a cash deal valuing the firm...
Google last week disabled all Xiaomi integrations on Nest Hub after learning that some users could access other people’s camera feeds.
Authorities in Thailand say they are investigating an apparent online break-in by a computer hacker that allowed him to broadcast surveillance video from inside...
Researchers working for F-Secure have identified a dozen vulnerabilities in popular Barco ClickShare wireless presentation systems. While the vendor has patched the most serious...
Study Aims to Show Links Between U.S. Voting Infrastructure and Nations With a Proven Aptitude and Desire to Target Elections
FireEye this week unveiled a new threat intelligence service focusing on operational technology (OT) and other systems that manage physical processes.The company says its...
Vulnerability in KeyWe Smart Locks Could be Exploited by Attackers to Intercept Communications to Steal Key and Unlock Doors
Austria-based IT security services and consulting company SEC Consult on Wednesday announced the release as open source of its SEC Xtractor assisted hardware analysis...
A group of Democratic U.S. senators is questioning Amazon about the security of its Ring doorbell cameras following reports that some Ukraine-based employees had...
As homes, workplaces, and cities digitally transform during our Fourth Industrial Revolution, many of those charged with securing this digital future can find it...
Pwn2Own Tokyo 2019 has come to an end and on the second day of the hacking contest bug bounty hunters have earned a total...
A graphical user interface (GUI) is now available for Kamerka, the open source reconnaissance tool that allows users to identify internet-exposed industrial control systems...
White hat hackers have earned a total of $195,000 for demonstrating vulnerabilities in TVs, routers and smartphones on the first day of the Pwn2Own...
Google this week announced OpenTitan, an open source silicon root of trust (RoT) project that can help ensure that both hardware infrastructure and the...
Hackers can use lasers to send voice commands to Siri, Alexa, Google Assistant and other voice assistants present on phones, tablets and smart speakers,...
A network of 50 honeypots deployed around the world has been catching and monitoring attacks against IoT devices. Such detected attacks have increased almost...
New Hardware-based Security Solution Helps Secure IoT Devices at the Silicon Level
ATLANTA — SECURITYWEEK 2019 ICS CYBER SECURITY CONFERENCE — Outdated and unsupported operating systems are still present and they still pose a serious risk...
Blockchain, or distributed ledger, is sometimes described as a 'solution in search of a problem'. There are many valid applications outside of pure cybersecurity...
Blockchain Can Protect Systems and Devices While Supporting IoT Devices that Have Few Security Defenses