Search Results for: tv Blog Post Is Your Smart TV Watching You? Warning from FBI December 29, 2019 Is Your Smart TV Watching You? How Can You Build a Digital Defense With Your Smart TV? If you just... Blog Post Anonymous In a Hacking Rampage Against Russia March 2, 2022 Less than a week after announcing a cyber offensive against Russia, Anonymous has attacked over 300 Russian targets. So far, the targets... Blog Post Smart-TV Bug Allows Rogue Broadcasts June 4, 2019 An attacker could gain remote access by chaining together an exploit for home routers with the TV flaw. Smart-TV hijacking... Blog Post Watch for Cybersecurity Games at the Tokyo Olympics August 10, 2021 Overwhelmed with watching the world’s best push the limits of humanity and represent the pride of their respective countries, it’s... Blog Post Japan Takes Emergency Cybersecurity Measures for the 2020 Olympics February 5, 2020 Japanese cybersecurity will face a lot of challenges this year, as Japan will host two major sports events: the Tokyo... Blog Post Cybersecurity In The Industrial Sector February 19, 2020 With the rapid development of industrial informatization and the arrival of the IoT, the integration trend of industrialization and informatization... Blog Post DO NOT Leave Your Smart Homes Vulnerable to Hackers February 7, 2020 The smart home can really enhance the quality of life. Imagine that you can operate the TV, dishwasher, and sweeping... Blog Post GoDaddy Takes Down 15,000 subdomains selling online scams April 26, 2019 GoDaddy took down 15,000 subdomains used in online scams. Online spam campaigns targeted users using fake celebrity endorsements to sell... Blog Post What is the Internet of Things? February 13, 2019 Most people when they think of the future like to visualize fully automated homes like those old “World of Tomorrow”... Blog Post LIFARS Cyber Security Training Video Gallery December 27, 2018 Free Cyber Security Awareness Training and Career Development Videos Learn cybersecurity basics with these essential videos from the LIFARS’s Experts.... Blog Post WikiLeaks: CIA Malware Turned iPhones, smart TVs into Hacking Devices March 8, 2017 WikiLeaks has leaked a large trove of CIA documents and hacking tools that were supposedly used by the agency to... Blog Post Ransomware Hackers Could Soon Target Smartphones, TVs: UK Cybersecurity Chiefs March 14, 2017 A joint report by the UK’s National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) has underlined the... Blog Post HBO Refuses to Pay Hackers as Leaks Continue August 14, 2017 HBO is refusing to negotiate with hackers who have allegedly stolen up to 1.5 terabytes of data from the premium... Blog Post Your Smart TV Could Be Targeted by Ransomware June 22, 2016 A relatively new malware called FLocker or Frantic Locker, has been discovered by cybersecurity researchers at Trend Micro, targeting android... Blog Post Lack of Corporate B2B Privacy Policies is a Glaring Security Hole May 18, 2017 There is a rarity of privacy policies in contracts shared between businesses that handle large swarms of consumer data which...
Blog Post Is Your Smart TV Watching You? Warning from FBI December 29, 2019 Is Your Smart TV Watching You? How Can You Build a Digital Defense With Your Smart TV? If you just...
Blog Post Anonymous In a Hacking Rampage Against Russia March 2, 2022 Less than a week after announcing a cyber offensive against Russia, Anonymous has attacked over 300 Russian targets. So far, the targets...
Blog Post Smart-TV Bug Allows Rogue Broadcasts June 4, 2019 An attacker could gain remote access by chaining together an exploit for home routers with the TV flaw. Smart-TV hijacking...
Blog Post Watch for Cybersecurity Games at the Tokyo Olympics August 10, 2021 Overwhelmed with watching the world’s best push the limits of humanity and represent the pride of their respective countries, it’s...
Blog Post Japan Takes Emergency Cybersecurity Measures for the 2020 Olympics February 5, 2020 Japanese cybersecurity will face a lot of challenges this year, as Japan will host two major sports events: the Tokyo...
Blog Post Cybersecurity In The Industrial Sector February 19, 2020 With the rapid development of industrial informatization and the arrival of the IoT, the integration trend of industrialization and informatization...
Blog Post DO NOT Leave Your Smart Homes Vulnerable to Hackers February 7, 2020 The smart home can really enhance the quality of life. Imagine that you can operate the TV, dishwasher, and sweeping...
Blog Post GoDaddy Takes Down 15,000 subdomains selling online scams April 26, 2019 GoDaddy took down 15,000 subdomains used in online scams. Online spam campaigns targeted users using fake celebrity endorsements to sell...
Blog Post What is the Internet of Things? February 13, 2019 Most people when they think of the future like to visualize fully automated homes like those old “World of Tomorrow”...
Blog Post LIFARS Cyber Security Training Video Gallery December 27, 2018 Free Cyber Security Awareness Training and Career Development Videos Learn cybersecurity basics with these essential videos from the LIFARS’s Experts....
Blog Post WikiLeaks: CIA Malware Turned iPhones, smart TVs into Hacking Devices March 8, 2017 WikiLeaks has leaked a large trove of CIA documents and hacking tools that were supposedly used by the agency to...
Blog Post Ransomware Hackers Could Soon Target Smartphones, TVs: UK Cybersecurity Chiefs March 14, 2017 A joint report by the UK’s National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) has underlined the...
Blog Post HBO Refuses to Pay Hackers as Leaks Continue August 14, 2017 HBO is refusing to negotiate with hackers who have allegedly stolen up to 1.5 terabytes of data from the premium...
Blog Post Your Smart TV Could Be Targeted by Ransomware June 22, 2016 A relatively new malware called FLocker or Frantic Locker, has been discovered by cybersecurity researchers at Trend Micro, targeting android...
Blog Post Lack of Corporate B2B Privacy Policies is a Glaring Security Hole May 18, 2017 There is a rarity of privacy policies in contracts shared between businesses that handle large swarms of consumer data which...