YOU ARE AT:TagsCyber attack

BROWSING: cyber attack

FCC seeks to require telcos to bolster network security

The ongoing fallout from the Salt Typhoon cyber attack on U.S. telcos may result in new requirements around network security plans In the wake of the Salt Typhoon cyber attack that penetrated more than half a dozen U.S. telecom networks, the FCC is taking a...

Japanese port hit by Russian ransomware attack

The ransomware attack, allegedly launched by Russia, targeted a container terminal at the Port of Nagoya in Aichi Prefecture Japan’s biggest maritime port suffered a ransomware attack that significantly disrupted cargo operations. The attack, allegedly launched by Russia, hit a container terminal at the Port...

Canada 5G consortium to focus on securing slices

The consortium will develop are artificial intelligence systems to detect a range of cyberattacks on 5G network slices as they happen The University of Waterloo announced a "5G and beyond" mobile network technology consortium with the aim of developing secure 5G network slices and improving...

Stages of a cyber attack

Virtual networks: a bullseye for hackers Virtualization of networks are on the rise as are cyber attacks. According to a report by FireEye and Mandiant, approximately 97% of organizations have had at least one hacker bypass there defense architecture. Moreover, network security devices like next...

IoT security attacks: a timeline of the internet of things’ darkest hours

IoT security, a worrisome past IoT security is a bit of a conundrum – the only time it gets the coverage it deserves is when it has failed, or is in the process of doing so. It is important to find the silver lining to...

IoT security attacks: a timeline of the internet of things’ darkest hours

IoT security, a worrisome past IoT security is a bit of a conundrum – the only time it gets the coverage it deserves is when it has failed, or is in the process of doing so. It is important to find the silver lining to...

Massive cyberattack reiterates IoT security concerns

A major distributed denial of service (DDoS) attack on Friday knocked out access to major websites including Netflix, Reddit, Spotify and Airbnb. As security experts have concluded, the attack was apparently carried out when bad actor(s) leveraged internet-connected devices including security cameras to overwhelm...

Bastille releases IoT security solution to protect enterprises from attacks

Bastille, which focuses on security for enterprise "internet of things" deployments, announced a new solution that uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security. The services is designed to enable the ability to sense,...

Bastille releases IoT security solution to protect enterprises from attacks

Bastille, an enterprise IoT security company, announced the availability of its new service to protect internet of things enterprises from information and security threats. Bastille’s solution uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security....

Meet the smiling self-driving car that communicates with pedestrians

A common language is required for how self-driving cars communicate with pedestrians, says Semcon, which has developed a smiling self-driving car technology. While car makers and software companies working on self-driving car technology research extensively how cars should interact with other cars in traffic, much...

Ixia Webinar: Network Security Deployment Best Practices

Today’s threat landscape demands the use of a complex array of proactive network security systems and monitoring solutions. What are the most common and useful network security solutions you should consider - next-gen firewalls, web-application firewalls, intrusion prevention systems? Many of these security tools require...

CCA Webinar: Addressing Cyber Threats with Best Practices – A Practical Approach

Cyber threats, secret intrusions and very public data breaches are now part of everyday threats, and the types and vectors of threats are bewildering. In addition to cyber criminals, carriers have to be worried about regulatory threats and enforcement actions. And the number of...

Verizon flaw left millions open to cyberattack

Carrier fixed problem after being tipped off by BuzzFeed In response to input from a news outlet, Verizon this week fixed a security gap that left some 9 million home Internet customers open to a relatively simple, but devastating, cyberattack. BuzzFeed News broke the story on...

Planes could be vulnerable to cyber attack via Wi-Fi

In-flight Wi-Fi could potentially open up avionics controls to hackers The U.S. Government Accountability Office on April 14 released a report detailing the potential for in-flight Wi-Fi networks to be compromised by cyber attacks. In the 56-page report, the GAO found that connectivity associated with modern...

EMEA: Cyber attacks grow out of Ukrainian, Middle East conflicts

Cyber war is not the stuff of science fiction any more. More than disruptive hacks and information theft, cyber attacks are now a significant part of the conflicts in Eastern Europe and the Middle East. At a press conference in Wales last week, NATO Secretary General Anders Fogh...