Device Hardening Blog
Read the latest news, developments and opinion pieces on device hardening from industry experts New Net Technologies.
According to security researchers with IOActive and Quarkslab, the popular confidential messaging app called Confide is riddled with security vulnerabilities.
Consumer Reports, a nonprofit organization that conducts non-biased and extensive reviews on cars, appliances, and other consumer goods, is preparing for the inclusion of cybersecurity and privacy safeguards when scoring products.
Romantik Seehotel Jägerwirt, a luxury lakeside hotel in the Austrian Alps, experienced a ransomware attack last week that was said to have left hotel guests locked in their bedrooms until the ransom was paid.
Researchers have confirmed that a Russian hacker successfully broke into the U.S. Election Assistance Commission (EAC) systems.
Last Friday, a massive distributed denial of service (DDoS) attack took down a number of vastly popular websites including Twitter, Spotify, and PayPal.
Medical device manufacturer St. Jude Medical was recently slammed by MedSec, a security startup specializing in medical devices, for selling products plagued with serious vulnerabilities.
According to the Ponemon Institute’s latest report, cloud adoption is rapidly growing, but companies are not taking security as seriously as they should be.
While organizations often acknowledge the need to implement solutions for the protection and management of privileged account credentials, a recent study found that very little are actually taking the necessary steps in employing best security practices.
TalkTalk has experienced profit losses of nearly fifty percent over the past year, due in part to the steep cost of several data breaches they experienced in just one years’ time.
The package delivery company, FedEx, has been the recent target of a phishing scam targeting English and Italian speaking customers.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.