Posts

Exploitation can result in hackers gaining access to full browsing histories and all…

Vulnerable in-vehicle infotainment systems have left some Volkswagen cars open to remote hacking,…

Researchers discovered a flaw in Amazon’s Alexa virtual assistant that enabled them to…

Despite numerous talks about IoT vulnerabilities at RSAC this week, a clear resolution on…

Researchers said a Mirai botnet variant, possibly linked to the IoTroop or Reaper…

A GTA hosting site is offering powerful DDoS attacks for $20 a pop,…

The rate of cloud adoption has increased rapidly, with more and more computing being pushed into the cloud, a trend identified in Serviceteam IT’s Cloud Snapshot Survey 2017. This growth in cloud computing has led to the development of networks of large data centres. However, this is already starting to slow, with an ever-increasing amount of computing moving back to the ‘edge’ of local networks. Processing will always occur wherever it is best placed for a given application at a given time and cloud has given us flexibility of computing resources; but we can’t help but think that reliable, elastic and on-demand networking is imperative to deliver the future.

Apple said it has fixed an undisclosed vulnerability in its HomeKit framework that…

Intel released eight patches for vulnerabilities in remote management software and firmware that…