The introduction of voice-activated smart home solutions – like Amazon Echo and Dot, Google Home, and Apple’s HomePod
Earlier this week, over 14 million Verizon customers had sensitive user data associated with their Verizon accounts released into the wild. A third-party vendor had stored the database on an improperly secured cloud server. While this unsecured server was located in the Amazon Web Services (AWS) cloud, the data breach was determined to be a result of human error on the contractor’s part, not any inherent security vulnerability in the AWS cloud.Details
Earlier this month WannaCry was named the world’s biggest cyberattack which hit at over 150 countries and infected over 300,000 machines across hospitals, universities, manufacturers, government agencies and other important centers.
On an increasingly massive scale, cybercriminals are repurposing connected Internet of Things (IoT) devices installed within our homes. These hackers use malware to enlist our smart thermostats, speakers, lights, and more as soldiers for their botnet armies – used in coordinated massive attacks causing security breaches that threaten the integrity of the internet.Details
zvelo, the leading provider of website and device categorization, unveils zveloAPI™, an ultra-fast, secure API, for accessing the zveloDP datasets through cloud-based queries and streaming data feeds.
A renewed sense of urgency to secure information, networks and electronic devices in order to thwart advanced hacking techniques loomed over the 2013 RSA conference floor in San Francisco. The harsh realization that traditional security measures simply don’t cut it anymore was confirmed by various keynotes and casual hallway conversations between peers.