Computers have become smaller, faster and cheaper, and that makes it possible to integrate them into all kinds of consumer devices. These Internet-of-Things (IoT) consumer devices are often insufficiently secure against cyberattacks.
Sep 17, 20 / Blog.
In this article, we list the eleven most important security issues faced by IoT devices. We will review them from the most severe though to the least. It is worth noting that the six most severe issues were used in an actual attack, or to demonstrate proof-of-concept of a vulnerability.
Sep 10, 20 / Blog.
CVE-2020-16875 is 8 september 2020 bekend gemaakt via 'Microsoft Patch Tuesday'. Deze update informeerd over het probleem, het risisco en het advies.
Sep 9, 20 / Blog.
Online conference tools are obviously very convenient, especially during the coronacrisis. But there are some snags about virtual meetings. For example, how do you make sure that the data you share is well protected? Read more about it in this blog.
Jun 25, 20 / Blog.
The Qbit Security Monitor continuously monitors your network infrastructuur. In this blog you will read about our different modules and we give examples of vulnerabilities and risks that can occur in the systems of your organisation.
Jun 23, 20 / Blog.
Commissioned by the Consumers' Association in the Netherlands, our ethical hackers examined four popular GPS watches for children and found serious flaws.
Apr 2, 20 / Blog.
In the coming weeks, our privacy advisor Mathijs Hummel will take you into the intriguing world of privacy and the impact of the corona virus on that fundamental fundamental right. To clarify the right to privacy, we start this series with a reflective piece looking at the historical context.
Mar 31, 20 / Blog.