article thumbnail

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

The researchers set up a honeypot to collect data on infected IoT devices, the way threat actors infect IoT devices and what families of malware are involved. The first data that emerged from the study is that threat actors continue to look at the IoT devices with increasing interest. . What is infecting IoT devices and how?

IoT 81
article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

Merriam-Webster defines big data as β€œan accumulation of data that is too large and complex for processing by traditional database management tools.” This is how big data analytics is enabling behavioral biometric-authentication mechanisms. Focus on Enhanced Security.