There’s an old English Christmas carol “The 12 Days of Christmas”, a cumulative song about 12 gifts that keep getting ‘grander’. As our Christmas gift to you, we wanted to list the top threats to be aware of heading into 2018, from least to most pressing. Let’s look at the vulnerabilities and potential points of attack to take into account for next year’s priorities: Continue reading
As the Internet of Things (IoT) permeates further into our lives, the potential for hackers to line their pockets or disrupt critical infrastructure moves increasingly from theory to practice. For those IT and business leaders looking for more guidance, check out our CLOUDSEC conference next week, 5 September. Continue reading
The Internet of Things is opening up new opportunities for businesses as well as introducing a new era of convenience for consumers. And it’s happening sooner rather than later: More than 24 billion IoT devices will connect to each other and the internet by 2020, according to Business Insider, and that’s a conservative estimate. The Motley Fool noted that other tech giants are predicting anywhere from 50 billion to 200 billion IoT devices within the next three years.
Today, more urban centers than ever are implementing a range of advanced technological systems: it’s the beginning of so called smart cities. These sensors and networks used in combination with citizens’ mobile devices create smarter cities capable of reduced pollution, increased safety, better engagement with residents and more accessible transportation options. As the majority of the world’s population – 65 percent – will call a city home by 2040, these IoT-centered, city-wide initiatives are well worth the investment. Continue reading
Healthcare organizations (HCOs) around the world are under attack. The data they store and process has become a valuable commodity on the cybercriminal underground and has even been linked to nation state attacks. In 2015, more than 113 million records were stolen in the U.S. alone, according to the Department of Health and Human Services. Many more cases undoubtedly go unreported, both at home and abroad. But why are Electronic Health Records (EHRs) so highly sought after? And where are organizations most exposed? Continue reading
Every year, around the new year, we are bombarded with lists of predictions for the coming year. In December 2015, the Trend Micro research team joined in a round of crystal ball gazing. Based on their insights in the ever-evolving cybercrime trends, they formulated some predictions about what to expect in 2016. One year later, as we are entering yet another new year and, once again, looking forward to new trends and developments in 2017, we would also like to take the time to look back and ask ourselves: were these predictions nonsense, or did 2016 prove them to be hard reality? Continue reading
Cyber security researchers have gone to great lengths in their efforts to raise awareness about the cyber threat-laden world we’re living in. They’ve hacked cars on the highway, found ways to sneak into the power grid, tried to break into airplane infotainment systems and even managed to get into Ashley Madison’s database.
But of all the penetration testing stunts to date, one recent demonstration in Germany really hits below the belt. Continue reading
2016 has barely started, and the world’s biggest technology show has already come to an end. Last week, all people and firms involved in the digital world were watching or – if possible – attending CES (Consumer Electronics Show) 2016, the world’s largest consumer electronics trade show. As always, Las Vegas provided the backdrop as we got a tantalizing glimpse into the future. And like last year, much of the focus centered on the Internet of Things. From smart cars over Belgian drones to fridges becoming family hubs: the digital future promises to be extremely connected. Continue reading