Internet of Things

iot attack
binoculars desert

mobileye collision avoidance

Security M&A: Intel parks in the collision avoidance space for $15 billion

Intel acquires mobileye, Apple and Cisco cybersecurity acquisitions

botnet bots

IoT malware clashes in a botnet territory battle

Mirai -- a notorious malware that’s been enslaving IoT devices -- has competition. A rival piece of programming has been infecting some of the same easy-to-hack products, with a resiliency that surpasses Mirai, according to security...

botnet bots

IoT malware clashes in a botnet territory battle

Mirai -- a notorious malware that’s been enslaving IoT devices -- has competition. A rival piece of programming has been infecting some of the same easy-to-hack products, with a resiliency that surpasses Mirai, according to security...

smart city pins iot navigation

Getting smarter about building smart cities

Security risks to consider with more interconnected devices used in the critical infrastructure of smart cities

security code big data cyberespionage byte

IoT malware starts showing destructive behavior

Hackers have started adding data-wiping routines to malware that's designed to infect internet-of-things and other embedded devices.

robot vacuum

Robots: Lots of features, not much security

Robotics is one of the fastest-growing components of the IoT. It can also be one of the more dangerous, if taken over by hackers. And given the level of vulnerabilities in them, that is a clear and present risk.

internet of things

Missing the mark on IoT security

Focusing on securing Internet of Things (IoT) devices is all the rage right now, but companies that are fixated on this specific issue are overlooking the more obvious solutions to their problems.

video

What is serverless computing?

In this animation, Network World explains some of the concepts of serverless computing, and how it represents the next phase of cloud computing for Internet of Things applications and products.

microsoft iot insider labs 03

Here's how Microsoft is helping companies build IoT hardware

One of the biggest challenges with building connected hardware is getting from proof-of-concept (PoC) prototypes to a devices that are ready for a large-scale production rollout. Microsoft is aiming to help with that issue through a...

hidden door

How to respond to device and software backdoors inserted or left by vendors

CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma.

handcuff arrest

Hire a DDoS service to take down your enemies

With the rampant availability of IoT devices, cybercriminals offer denial of service attacks to take advantage of password problems.

hydra hercules

Mirai is the hydra of IoT security: too many heads to cut off

Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any headway.

International Paper Company

Online cybersecurity course targets business professionals

As tech folks adapt to the language of business risk, business professionals learn the language of cyber

screen shot 2017 02 27 at 4.33.35 pm

US senator probes into CloudPets smart toy hack

A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices.

home automation

Consumers are wary of smart homes that know too much

Nearly two-thirds of consumers are worried about home IoT devices listening in on their conversations, according to a Gartner survey released Monday.

video

Take a walk through Intel's smart city concept at MWC 2017

Intel's technology can help monitor traffic flow, blanket the city in Wi-Fi, and even summon emergency help faster.

screen shot 2017 02 27 at 4.33.35 pm

Smart teddy bear maker faces scrutiny over data breach response

Did a toymaker ignore warnings about a data breach? That’s a key question swirling around Spiral Toys, a company behind a line of smart stuffed animals that security researchers worry can be easily hacked.

home protection

Here’s a new way to prevent cyberattacks on home devices

Homeowners worried about cybersecurity attacks on IP-connected devices like lights, baby monitors, home security systems and cameras, will soon be able to take advantage of a $200 network monitoring device called Dojo.

Load More