14 hidden Pixel features for smarter calling
Pixel phones are filled with efficiency-enhancing Google intelligence, and one area that’s all too easy to overlook is the way the devices can improve the act of actually talking on your cellular telephone. That’s true for any Pixel model, no matter how old it may be, and it’s especially true for the more recent Pixel […] more…Cyber Insights 2023 | Zero Trust and Identity and Access Management
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […] more…How we hacked our colleague’s smart home
In this article, we publish the results of our study of the Fibaro Home Center smart home. We identified vulnerabilities in Fibaro Home Center 2 and Fibaro Home Center Lite version 4.540, as well as vulnerabilities in the online API. An offer you cannot refuse The backbone of any technology company is made up of […] more…Has Your Phone Become Your Third Child? Ways to Get Screen Time Anxiety Under Control
You aren’t going to like this post. However, you will, hopefully, find yourself nodding and perhaps, even making some changes because of it. Here it friends: That love-hate relationship you have with your smartphone may need some serious attention — not tomorrow or next week — but now. I’m lecturing myself first by the way. […] more…A CMO’s guide to staying secure on a business trip
Executives spend a lot of time on the road (or in the air). And while the speed and convenience of business travel has greatly improved over the years, the challenges associated with information security are only increasing. Your ability to protect your data and devices while traveling matters more than you’ll ever know. Are you […] more…Kaspersky DDOS intelligence report for Q3 2016
Q3 events Cybercrime as a Service In the last few months the scale of the global ‘Cybercrime as a Service’ infrastructure has been revealed – fully commercialized, with DDoS as one of the most popular services capable of launching attacks the likes of which have never seen before in terms of volume and technological complexity. […] more…More information
- U.S. Unveils Cybersecurity Policies for Space Systems
- Apple and Google questioned by Congress over user tracking
- WannaMine Malware Spreads via NSA-Linked Exploit
- Malicious Adware Uses Certificates to Disable Security Products
- Another link found between Gauss and Flame malware
- Juniper to Enhance RNG in ScreenOS
- Don’t believe the blockchain hype: Examining its weaknesses and risks
- The new MacBook: I hope you like dongles
- vCloud vs. vSphere: VMware explains security changes
- CSA Unveils SaaS Security Controls Framework to Ease Complexity