The dangers of working in a siloed manner are becoming increasingly apparent, with the risks of such an approach extending beyond simple isolation to endangering profit margins, company growth and even human life. However, innovations in operations, such as cloud computing and the analysis and insight it offers, are transforming the mining industry. The cloud […]
Blog Grid
Researchers have identified a serious security flaw in the IEEE 802.11 WiFi protocol standard, which can be exploited by hackers to trick access points into leaking network frames in plaintext form. Frames are data containers that hold important information such as source and destination MAC addresses, control and management data. The flaw affects various devices […]
Multiple users and researchers have reported that eFile.com, a tax return software authorized by the IRS, has been caught serving malware. The malicious JavaScript file in question is called ‘popper.js’, which was being loaded by almost every page of eFile.com until at least April 1st. The ‘popper.js’ file contained a code that attempted to load […]
Multiple vulnerabilities in Nexx smart devices have been discovered, which can be exploited to control garage doors, disable home alarms, or smart plugs. The vulnerabilities include the use of universal credentials hardcoded in the firmware, allowing attackers to remotely control any customer’s devices. This vulnerability can also be used to identify Nexx users and collect […]
As cyberattacks become increasingly sophisticated, companies face severe financial and reputational damage. With the use of artificial intelligence and machine learning, hackers exploit vulnerabilities, making social media scams more challenging to detect. Therefore, cybersecurity has become a key factor when considering a move to the cloud. Cloud ERP providers invest heavily in capabilities to protect […]
According to research by the GSMA, the market for virtual network slicing among businesses is estimated to reach a value of USD$300bn by 2025. However, mobile operators must be aware of the added responsibility they will face regarding cybersecurity if they choose to offer network slicing to their business clients using their 5G networks. SecurityGen’s […]