Kaspersky helps eliminate smart home controller vulnerabilities

Kaspersky researchers investigating the control device for an active smart home ecosystem have identified several critical vulnerabilities. These include bugs in the cloud infrastructure and potential remote code execution that would allow a third party to get...

Trend Micro software blocks 5m camera hack attempts

Trend Micro says it has blocked 5-million attempted cyberattacks against IP cameras in just five months. Through its strategic partnership with global IP security solution provider Vivotek, Trend Micro’s IoT security solutions are embedded in globally deployed...

Strengthening cybersecurity with a zero trust approach

In response to sophisticated and targeted cyberattacks, organisations have begun to shift their focus to proactive strategies that employ advanced cybersecurity technology and techniques. Threat Hunting, a strategy for investigating potential threats before they cause...

Check Point debuts Malware DNA

Check Point Software Technologies has introduced a new artificial intelligence-based malware detection engine to its SandBlast Network threat prevention solution, to enable even faster, more accurate prevention of malicious attacks. The new Malware DNA engine...

LoudMiner uses virtualisation software to mine cryptocurrency

ESET researchers have discovered an unusual cross-platform cryptocurrency miner called LoudMiner. LoudMiner uses virtualization software – QEMU (short for Quick Emulator) on macOS and VirtualBox on Windows – to mine cryptocurrency on a Tiny Core Linux...