Mar 28, 2017

WikiLeaks recently released documents on a program called “Weeping Angel” that allowed spy agencies to install software on smart TVs. Even when the TV is switched off, it could listen in on conversation!

Feb 22, 2017

The DDoS (Distributed Denial-of-Service) occurrences are in everyone’s mind! Over the last few years, there has been an increase both in terms of number of attacks and scale of the attacks. Typically, a DDoS attacks consists in overwhelming a server by a number of requests it cannot handle. To complete a DDoS attack, hackers use relays: they take control of easy targets and use these targets to trigger the attack on the server itself.

Jan 31, 2017

According to the Identity Theft Resource Center, 900 major data breaches were recorded worldwide in 2016, up from 783 in 2014. In the hyper connected world, this is not really a surprise!

<< <
Page 2 of 3
 > >>

About this blog…

 

Trusted Objects team members have a long experience in the smart security industry, and are reacting to industry trends & news.