- Mistaken assumptions about smart home cybersecurity lead to more problems
- We put much trust in a particular IoT device, but we don't secure it enough
- There's always a solution, no matter the security issue
All about Virtualization and Cloud Security | Recent Articles:
What's the Most Vulnerable Type of Device in a Smart Home? You'll Never Guess
Mar 19
by
Silviu Stahie
- Bitdefender's telemetry shows a huge disparity in the number of culpable operating systems
- Learning from available security-related data is a necessary step to strengthen the IoT industry
- The current state of IoT security requires an outside security solution that acts an equalizer
A year ago, we would step into the office each morning, swipe our badge at reception, pass the security cameras, and sit down at our desks beside our colleagues. The safety-savvy IT department -- home to complex security technologies, bottomless coffee cups and handy tips -- was mere steps away.
People’s homes are full of cameras and microphones, which in theory allow attackers to do more than just hijack your IoT devices for a DDoS attack. The extent of IoT security problems should worry everyone, especially since many homes lack essential protection. And few service providers can offer this kind of protection.
- IoT manufacturers often favor speed of rollout over security
- Attackers don’t have to work too hard to compromise smart devices
- It’s up to users and ISPs to protect homes and network infrastructure
- To fix a problem you first need to know of its existence
- IoT devices are often the target of malware botnets and campaigns
- ISPs need to deal with IoT security from a much broader perspective
Most Companies in US and Canada Gather User Data through Third-Party Code without Telling Customers, Survey Finds
Dec 29
by
Silviu Stahie
- Advertisers usually use gathered data to better target customers
- Most companies allow some sort of user tracking
- The more money companies makes from ad revenue, the laxer the rules governing data gathering
Organizations Relied More in 2020 on Crowdsourced Cybersecurity, Report Finds
Dec 24
by
Silviu Stahie
- Companies need bug bounty platforms now more than ever
- The increase in the number of threats in 2020 pushed companies to secure their products better
- Human error is a main source of cyber risk
Most Industries Plan Substantial Investments in IT to Support Remote Workers in 2021
Dec 22
by
Silviu Stahie
- Organizations don’t want to be caught off-guard again by a COVID-like crisis
- Most industries believe work-from-home is here to stay and are prearing to invest accordingly in security
- Some industries will invest way over 100 percent in their IT departments
- Attackers spoof the Microsoft.com domain
- Lookalike websites used to steal credentials
- Microsoft doesn’t implement the DMARC protocol
- People are not always the weakest link
- Trickbot was hit, but it’s operators are trying to make a comeback
- ISP’s devices are oftentimes unwilling participants in massive botnet networks
Cloud Security Is a Primary Concern for Most Companies and Decision Makers, Report Finds
Dec 04
by
Silviu Stahie
- Data loss is one of the issues most companies fear
- Many organizations continue to implement legacy solutions to secure modern cloud environments
- Privacy is also a challenge for more organizations that deal with private data
Cloud Security
Subscribe to Blog Updates
Posts by Categories
- Advanced Persistent Threats (8)
- CISO (20)
- Cloud Security (122)
- Cybersecurity Awareness (28)
- Endpoint Detection and Response (6)
- Endpoint Protection & Management (25)
- Enterprise Security (428)
- Events (4)
- Financial Services (16)
- Healthcare (22)
- IoT Security (25)
- IT Compliance & Regulations (53)
- Machine Learning (9)
- Managed Detection and Response (8)
- Managed Service Providers (19)
- Network Protection (11)
- Privacy and Data Protection (105)
- Ransomware (12)
- Remote Work (5)
- SMB Security (44)
- Telecommunications (2)
- Threat Research (94)
- Virtualization & Data Center Security (82)
Latest Tweets
Tweets by @Bitdefender_EntPosts by Month
- April 2021 (3)
- March 2021 (18)
- February 2021 (9)
- January 2021 (12)
- December 2020 (31)
- November 2020 (33)
- October 2020 (39)
- September 2020 (26)
- August 2020 (29)
- July 2020 (34)
- June 2020 (40)
- May 2020 (33)
- April 2020 (31)
- March 2020 (28)
- February 2020 (23)
- January 2020 (26)
- December 2019 (28)
- November 2019 (24)
- October 2019 (28)
- September 2019 (19)
- August 2019 (17)
- July 2019 (23)
- June 2019 (15)
- May 2019 (17)
- April 2019 (20)
- March 2019 (19)
- February 2019 (20)
- January 2019 (19)
- December 2018 (19)
- November 2018 (23)
- October 2018 (22)
- September 2018 (22)
- August 2018 (23)
- July 2018 (24)
- June 2018 (22)
- May 2018 (28)
- April 2018 (23)
- March 2018 (22)
- February 2018 (19)
- January 2018 (19)
- December 2017 (13)
- November 2017 (17)
- October 2017 (19)
- September 2017 (18)
- August 2017 (16)
- July 2017 (17)
- June 2017 (16)
- May 2017 (17)
- April 2017 (15)
- March 2017 (16)
- February 2017 (13)
- January 2017 (14)
- December 2016 (11)
- November 2016 (14)
- October 2016 (11)
- September 2016 (10)
- August 2016 (15)
- July 2016 (12)
- June 2016 (15)
- May 2016 (10)
- April 2016 (13)
- March 2016 (15)
- February 2016 (14)
- January 2016 (6)
- December 2015 (6)
- November 2015 (9)
- October 2015 (8)
- September 2015 (11)
- August 2015 (8)
- July 2015 (10)
- June 2015 (3)
- May 2015 (8)
- April 2015 (6)
- March 2015 (5)
- February 2015 (7)
- January 2015 (8)
- December 2014 (8)
- November 2014 (9)
- October 2014 (8)
- September 2014 (9)
- August 2014 (9)
- July 2014 (8)
- June 2014 (8)
- May 2014 (6)
- April 2014 (8)
- March 2014 (5)