Internet of Things
Internet of Things | News, how-tos, features, reviews, and videos
7 machine identity management best practices
Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.
Fragmented tool landscape biggest cybersecurity challenge to medical device makers
Continuous monitoring of security throughout the medical device product lifecycle also poses problems.
CISA warns of attacks against internet-connected UPS devices
Threat actors have targeted power supplies whose control interfaces are connected to the internet, and CISA says that they should be disconnected immediately.
What is Shodan? The search engine for everything on the internet
Shodan is a search engine for internet-connected devices — from web cams to water treatment facilities, yachts, and medical devices.
Man-in-the-middle (MitM) attack definition and examples
A man-in-the-middle (MitM) attack is a type of cyberattack in which communications between two parties is intercepted, often to steal login credentials or personal information, spy on victims, sabotage communications, or corrupt data....
What is NAC and why is it important for network security?
NAC plays a key role in Zero Trust network access (ZTNA), and is a powerful tool for securing IoT devices and protecting mobile and remote workers
Critical flaws in remote management agent impacts thousands of medical devices
The Axeda platform, used by hundreds of IoT devices, has seven vulnerabilities, three of which allow for remote code execution.
NIST releases software, IoT, and consumer cybersecurity labeling guidance
The new guidance aims to tighten security requirements for federally purchased software and give consumers better insight into the security of software and devices they buy.
Outdated IoT healthcare devices pose major security threats
Ransomware has emerged to become the worst nightmare in healthcare and hospital devices running on outdated Windows versions or open-source software like Linux are the easy targets, according to research by Cynerio.
7 hot cybersecurity trends (and 2 going cold)
Is that security trend hot or not? From tools and technologies to threats and tactics, the numbers don't lie.
NIST gears up for software security and IoT labeling pilot programs
Intended to help consumer make more secure software and IoT device purchases, the labeling guidelines are voluntary and self-policing at this time.
Flaws in the Nucleus embedded TCP/IP stack puts critical systems at risk
The NUCLEUS:13 vulnerabilities can allow remote code execution or denial of service attacks. Billions of devices could be affected.
BusyBox flaws highlight need for consistent IoT updates
Some of the 14 vulnerabilities could result in remote code execution or denial of service attacks.
Securing the edge: 4 trends to watch
The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.
BlackBerry faces bad PR by failing to go public with BadAlloc vulnerability
Although the company informed its OEM customers of the vulnerability, users of IoT devices running its QNX OS were potentially kept in the dark.
IoT devices have serious security deficiencies due to bad random number generation
It's not the IoT vendors' fault. Lack of a cryptographically secure pseudo-random number generator subsystem for the internet of things devices will be vulnerable.
Serious flaws in widespread embedded TCP/IP stack endanger industrial control devices
Critical vulnerabilities potentially affect millions of devices, but finding and patching them will be difficult.
The race to secure 5G
The arrival of 5G technology introduces a new era of digital transformation. Security can't be an afterthought.