The Latest in IT Security

1

Tens of millions of products ranging from airport surveillance cameras, sensors, networking equipment and IoT devices are vulnerable to a flaw that allows attackers to remotely gain control over devices or crash them. The vulnerability, dubbed Devil’s Ivy, was identified by ​researchers at Senrio, who singled out high-end security cameras manufactured by Axis Communications.

Read more ...

1

Businesses prefer storing data in the cloud but plan to invest in extra security precautions, according to B2B ratings and reviews firm Clutch. Nearly 70% of businesses on the cloud prefer storing data in the cloud instead of on a legacy system, and these businesses are willing to invest heavily in keeping their cloud’s data secure.

Read more ...

1

IBM today unveiled IBM Z, the next generation of a transaction system capable of running more than 12 billion encrypted transactions per day. The new system also introduces an encryption engine that, for the first time, makes it possible to pervasively encrypt data associated with any application, cloud service or database all the time.

Read more ...

1

Pro wrestling giant World Wide Entertainment notified fans on Thursday that a database containing personal information of three million fans was left on an insecure server. According to the WWE, personal information included names, both home and email addresses, earnings, ethnicity, children’s age ranges, birthdates and additional personally identifiable information.

Read more ...

Categories

TUESDAY, JULY 25, 2017

Featured

Archives

Latest Comments

Social Networks