by Mirko Zorz - Editor in Chief - Wednesday, 5 March 2014.
Embedded devices are everywhere and they make our lives more convenient, but from a security standpoint, they can be intimidating, especially if we're talking about an infusion pump or a piece of equipment that runs the critical infrastructure.
In this podcast recorded at RSA Conference 2014, Billy Rios, Director of Threat Intelligence at Qualys, provides an understanding of these systems - they are computers after all.
Press the play button below to listen to the podcast:
Posted on 24 July 2014. | The firewall turned 25, and McAfee is celebrating with an infographic that creatively depicts its lifetime. If you take a moment to scan the infographic, you’ll notice the firewall's introduction and evolution coincide with certain security events.
Posted on 23 July 2014. | Cybercriminals no longer send out thousands of emails at random hoping to get a handful of hits, today they create highly targeted phishing emails which are tailored to suit their recipients.
Posted on 22 July 2014. | A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.