A typical home has around five devices connected to the local network which aren’t computers, tablets, or mobile phones, and all of them can be vulnerable to attack.
Understanding EMV cards is half the challenge, being able to properly use them is the other half. A liability shift at the beginning of October aims to make chip technology more accessible.
Mozilla released Firefox 42 with an initiative to improve the privacy and security experience for the average user.
The benefits of using a trusted Certificate Authority for the security of your company far outweigh the potential loss of securing it yourself.
The focus of week three of National Cyber Security Awareness Month is cybersecurity trends and how they might affect your business.
On October 13, 2015, Google released Chrome 46. Chrome 46 introduces an icon change in the URL address bar for sites with minor HTTPS connection errors. Minor errors include a lack of Certificate Transparency (CT) information and/or use of SHA-1 certificates, obsolete cipher suites, and certain types of mixed content. In an effort to encourage […]
Manufacturers should take responsibility for the encryption and authentication of IoT devices.
Research findings do not directly undermine the security of the Internet at large. Given the lessons learned with the MD5 full break, it is not advisable to wait until these become practically possible.
The health industry is subject to 340% more security incidents when compared with other industries.