BusyBox flaws highlight need for consistent IoT updates

Security researchers have found and reported 14 vulnerabilities in the BusyBox userspace tool that’s used in millions of embedded devices running Linux-based firmware. While the flaws don’t have high criticality, some of them do have the potential to...

Tabletop exercises: Six sample scenarios

A tabletop exercise is an informal, discussion-based session in which a team talks through their roles and responses during an emergency, walking through one or more example scenarios. It’s a great way to get business continuity plans off the written...

Malware detection in 9 easy steps

All antivirus software misses a significant percentage of malware. This is because professional malware writers design their malware and botnet ecosystems to self-update whenever they start getting detected. While antivirus engines eventually sniff out millions of...

Digital Signature

Digital signature is an electronic signature used to verify the identity of the sender/ signer of a message and also to ensure the correctness and validity of information in electronic transactions. The use of recognized digital signature can fulfil requirements of...