Remove Authentication Remove Hotels Remove Security
article thumbnail

Keezel's wireless device protects hotel Wi-Fi , home IoT connections

Network World

In cryptography, the "man in the middle" is usually an attacker -- but when Keezel wants to get between you and the Wi-Fi connection in your hotel or your home, it's for your own good. After a long crowdfunding campaign, the company is getting ready to ship its Wi-Fi security device, also called Keezel, in October.

Hotels 150
article thumbnail

It's 2017 and changing other people's flight bookings is incredibly easy

Network World

The travel booking systems used by millions of people every day are woefully insecure and lack modern authentication methods. This allows attackers to easily modify other people's reservations, cancel their flights and even use the refunds to book tickets for themselves, according a team of researchers who analyzed this online ecosystem.

Hotels 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Pick the Right Technology to Enable the Remote Workforce

CIO Business Intelligence

That’s where Security Service Edge (SSE) is an advantage. Think of the analogy of securing your home,” says Thayga Vasudevan, Vice President of Product Management for Skyhigh Security. Think of the analogy of securing your home,” says Thayga Vasudevan, Vice President of Product Management for Skyhigh Security.

How To 245
article thumbnail

Ransomware Exponentially Increasing as IoT Provides Physical Targeting Opportunities

CTOvision

Ransomware in late 2016 interrupted San Francisco Municipal Transportation Authority (SFMTA) payment machines and in Jan 2017 compromised the electronic key system of an Austrian hotel. In Nov 2016 a DDoS attack against building heating took heating offline in several buildings in Finland.

article thumbnail

An expanded attack surface: The cybersecurity challenges of managing a hybrid workforce

CIO Business Intelligence

At a recent CIO New Zealand roundtable event in Auckland, supported by Palo Alto Networks and Vodafone New Zealand, senior technology executives from organisations across Aotearoa discussed the challenge of keeping security front of mind when the workforce is dispersed. The other key aspect is implementing zero trust networking.

Exercises 290
article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland. She is the author of Surveillance or Security? BALTIMORE , Sept.

Security 150
article thumbnail

A Vision of Radical Networking Simplicity

CIO Business Intelligence

Count them: the home Wi-Fi, the ISP, the Internet, a Domain Name System (DNS) provider, a content delivery network (CDN), applications distributed among multiple providers in multiple clouds, credit authentication companies, a private customer information database. Problems often take a long time to identify and resolve.

Network 243