In-brief: Despite the benefits of the DevOps paradigm and application virtualization in software products’ lifecycle, security professionals believe that in combination with cloud computing the two methods increase the complexity of the corporate network, making it more difficult to defend, the cyber security assurance report from Tenable Network Security outlines.
Author: Ionut Ilascu
In-brief: The discovery of a malicious link buried in software for a common IP camera sold on Amazon and other online retail outlets is just the latest example of supply chain based threats to connected products.
In-brief: A new study by BitDefender suggests that security lapses dampen the appeal of smart home appliances and could (literally) open the door to burglars.
In-brief: VNC Roulette is just the latest warning shot across the bows of industrial firms and the public sector: parading screen shots of remotely accessible but insecure SCADA systems for all to see.
In-brief: Wind turbines made by the UK firm XZERES Wind are susceptible to common, web-based attacks including cross site scripting, according to a warning published by the Industrial Control System CERT (ICS-CERT).