Research

This is a archive for Research.

Social Media Data Collection Regulation: Survey

Governments should regulate the collection of personal data by social media companies to protect user privacy, but on the other hand,
Read More.

APT Group Targets Servers on Global Basis

The infrastructure used by the well-known Russian-speaking APT group Crouching Yeti, or Energetic Bear, includes compromised servers across the world,
Read More.

Android Backdoor Tied to North Korea

KevDroid Android backdoor is tied to the North Korean Reaper hacking group, researchers said. The hacking group, also going by
Read More.

OT Leaders Lack Effective Controls: Report

Almost 60 percent of executives at critical infrastructure operators said they lack appropriate controls to protect their environments from security
Read More.

Attacks More Sophisticated, Organized: Report

When it comes to security, users are making strides when it comes to intrusion and detection, but they will have
Read More.

Breaches Discovered Internally: Report

With security awareness increasing and stronger tools available, organizations are getting better at discovering data breaches on their own, a
Read More.

Ransomware Top Attack Method: Report

The amount of records breached last year dropped nearly 25 percent, and that is the good news, however, the bad
Read More.

Security Spending on Rise Globally

Global spending on security-related hardware, software, and services should hit $91.4 billion in 2018, an increase of 10.2 percent over
Read More.

IoT Device Market to Skyrocket

Internet of Things (IoT) device management market size from a global perspective should reach $5.1 billion by 2025, new research
Read More.

How to Hack a ‘Smart’ Building

Building automation is a great frontier for hackers wanting to get into a facility and wreak havoc. With today’s technology,
Read More.

 
 
Archived Entries