Futher to my last post about social engineering in the IoT; here are a couple of attack scenarios that we might easily see emerge. Attack scenario 1: Reflected targeting and compromise Things are often too limited in processing and memory to compromise and manipulate to large effect. What is more, they might not have information […]

Chapter 1: Preparing to Deploy Data Loss Prevention”  Deploying a data loss prevention (DLP) solution can be intimidating, but take heart—it’s not as daunting as you might think if you approach it step by step. In his four-chapter white paper, Implementing and Managing a Data Loss Prevention Solution, Rich Mogull, analyst and CEO of independent research […]

Time to wind down the Barcelona adventure, and onto Milan now!  This week we have announced some remarkable partnerships within the mobile industry ranging from the biggest handset OEMs, infrastructure providers and mobile network operators. These deep relationships have been established in almost every corner of the mobile ecosystem and we’re all agreed on one […]

Intel Security’s McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely on victims’ trust in a particular brand or public authority to hand over information or allow their systems to become infected with malicious code. This week, the McAfee Labs team uncovered a new […]

Remember this time last year when Snapchat was this vague, phantom-like disappearing photo app? Well, in just a year’s time, Snapchat has skyrocketed to become the fastest growing app for teens. Between Snapchat and Instagram, teens are spending an unprecedented amount of time communicating with less words and more photos. This popular app is here […]