Internet of Things

handcuff arrest
hydra hercules

International Paper Company

Online cybersecurity course targets business professionals

As tech folks adapt to the language of business risk, business professionals learn the language of cyber

screen shot 2017 02 27 at 4.33.35 pm

US senator probes into CloudPets smart toy hack

A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices.

home automation

Consumers are wary of smart homes that know too much

Nearly two-thirds of consumers are worried about home IoT devices listening in on their conversations, according to a Gartner survey released Monday.

video

Take a walk through Intel's smart city concept at MWC 2017

Intel's technology can help monitor traffic flow, blanket the city in Wi-Fi, and even summon emergency help faster.

screen shot 2017 02 27 at 4.33.35 pm

Smart teddy bear maker faces scrutiny over data breach response

Did a toymaker ignore warnings about a data breach? That’s a key question swirling around Spiral Toys, a company behind a line of smart stuffed animals that security researchers worry can be easily hacked.

home protection

Here’s a new way to prevent cyberattacks on home devices

Homeowners worried about cybersecurity attacks on IP-connected devices like lights, baby monitors, home security systems and cameras, will soon be able to take advantage of a $200 network monitoring device called Dojo.

screen shot 2017 02 27 at 4.34.08 pm

Smart teddy bears involved in a contentious data breach

If you own a stuffed animal from CloudPets, then you may have been hacked. The company’s toys -- which can receive and send voice messages from children and parents -- have been involved in a serious data breach dealing with more than...

video

NTT DoCoMo demos VR control of robots over 5G

While next-generation 5G cellular will bring faster downloads for consumers, the new networking technology is poised to bring big benefits to business users enabling new users for cellular networks.

heart monitor

FDA 'guides' the way to medical device security

The FDA’s “guidance” documents on medical device security are non-binding. But advocates say they will still have plenty of legal force – especially when it comes to things like insurance or civil suits for damages from insecure...

webcam laptop

9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

IOT Toothbrushes
video

Adding data to toothbrushes, MRI machines

From toothbrushes to high-end medical imaging equipment, Philips is offering its consumer and business customers access to more data through Internet of Things-type sensors.

schneier at rsa 2017

Bruce Schneier: Public-service technologists are needed to tame the IoT

The internet of things needs to be regulated and soon before it becomes even more of a tool to facilitate cyberattacks, and that means coming up with civic-minded technologists to help formulate government policies, security expert...

rtx2xfts

CISOs need to keep up with the hyper pace of security

Innovations are causing a seismic shift in how we consider information security, pushing the protection of consumer payments beyond the traditional role of finance and/or IT departments to design and manufacturing of everyday products...

Intel Security General Manager Chris Young

RSA: Watch out for a new weapon - your own data

As tens of thousands of the world’s top security pros gather at RSA Conference 2017 they are being called upon to watch out for a new threat: their own data.

College campus building

IoT botnet bogs down college campus network

Senior members of the unnamed university’s help desk had been receiving an increasing number of complaints from students across campus about slow or inaccessible network connectivity. With Verizon's help, they tracked down the botnet...

headphones espionage monitoring

Expert: Line between cyber crooks and cyber spies getting more blurry

Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and governments, says the former top U.S....

security cameras pole

Are companies doing enough on the IoT security front?

If security executives thought they had a lot to handle with the growth of mobile devices and the expanding digital enterprise, the emergence of connected products, corporate assets, vehicles and other “things” is taking security...

security code big data cyberespionage DDoS

Windows Trojan hacks into embedded devices to install Mirai

Attackers have started to use Windows and Android malware to hack into embedded devices, dispelling the widely held belief that if such devices are not directly exposed to the Internet they're less vulnerable.

Load More
You Might Also Like