Here is our latest news roundup of articles about network and SSL security. (Click here to see the whole series.) SSL & Encryption Security researchers have discovered a flaw dubbed the DROWN vulnerability that allows an attack to decrypt traffic from secure servers supporting SSLv2, which is obsolete. Soon after researchers announced the vulnerability, OpenSSL […]
According to Gartner, public key infrastructure (PKI) will re-emerge as one of the most relevant mechanisms for organizations to address the IoT authentication problem.
When it comes to security, more and more technologies piled on a system will have an inverse impact and make it harder for an organization to manage and analyze data.
As smart devices find their place in the majority of modern homes, users must begin taking an active approach in protecting themselves and their homes from potential security breaches.
They’re your most frequently used devices, but they’re also the most frequently hacked devices. Learn what you can do to decrease the security risks on your devices.
Cybersecurity professionals used 2015 cyber-attacks to guide security predictions for the upcoming year. Start preparing now.
A typical home has around five devices connected to the local network which aren’t computers, tablets, or mobile phones, and all of them can be vulnerable to attack.
Manufacturers should take responsibility for the encryption and authentication of IoT devices.
This year’s DEF CON illustrated vulnerabilities in smart automobiles, encouraging IoT manufacturers to make security a top priority.