Internet of Things

Internet of Things | News, how-tos, features, reviews, and videos

blue green abstract finger print identity bio security fingerprint

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Who is responsible for IoT security in healthcare?

NIST panel debates who should own IoT security: vendors or users. The issue is especially important when it comes to protecting medical devices.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

BlackBerry's acquisition of Cylance raises eyebrows in the security community

BlackBerry's move into the endpoint security game may create public safety issues, given the company's history with encryption backdoors, experts say.

2 industrial iot utility nuclear plant power plant

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it.

hovering drone / camera / propellor blades

Critical authentication flaw in DJI drone web app fixed

Check Point researcher finds vulnerability that could have allowed attackers to spy on drone fleets in real time.

industrial iot robotics ai automation programmin code

Why fake data is a serious IoT security concern

IoT devices create massive amounts of data, all which could be polluted to throw off operations, business decisions, and even machine learning models.

5 small business security

Beware the IoT spy in your office or home via smart furniture, warns NSA

NSA discussed potential security and privacy issues of connected office furniture.

1 network internet connected grid earth power satellite view

Thousands of critical energy and water systems exposed online for anyone to exploit

Critical functions such as starting or stopping a system can be accessed online by anyone, be it nation-state attackers or script kiddies.

a digital brain and circuit board

Flaws in brain stimulation tech could let hackers erase or hold memories for ransom

If security flaws in brain stimulation tech are not fixed, researchers warn that hackers will be able to target your memories, erase them or hold them for ransom in the future.

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

thumbnail
video

How to use the Shodan search engine to secure an enterprise's internet presence

Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup and content producer Juliet Beauchamp talk through the security scenarios.

1 tsunami

The IoT tsunami is coming

The Internet of Things will change everything, in all sectors...and you'd better have a plan.

lenovo tab 4 alexa mute

Amazon patent gives Alexa ability to detect illness, 'emotional abnormality'

Amazon's Alexa may one day detect your real-time status, if you're sick, or if you have an "emotional abnormality" and target you with ads based on the voice analysis.

windows bug

Microsoft patch for JET flaw zero-day is ‘incomplete,’ Windows still vulnerable

Microsoft's fix for the zero-day JET flaw only limits the vulnerability, doesn't eliminate it. Meanwhile, a Pentagon breach affects 30,000 workers, and a vigilante hacker is patching vulnerable MikroTik routers.

thumbnail
video

Regulating the IoT: A conversation with Bruce Schneier | Salted Hash Ep 49

Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars, refrigerators, toys and soon, even more home consumer items.

medical network h/ ealthcare IoT / hospital connections and communications

Securing connected medical devices: Will categorizing them as ICS help?

Now that they’re no longer protected by an “air gap,” let’s consider what’s needed to protect connected medical devices from security threats.

blackvue dashcam gps mapped locations

BlackVue dashcams share cars' mapped GPS locations, stream video feeds and audio

Thanks to default cloud settings, BlackVue dashcam customers may be live-streaming video and audio from their vehicles, as well as having their location mapped.

botnet security computer code

New vicious Torii IoT botnet discovered

Move over, Mirai. There’s a new, much more sophisticated IoT botnet boss. The Torii IoT botnet has advanced techniques and persistence methods.

nwan 019 iiot
video

What is IIoT?

The Industrial Internet of Things, or IIoT, is the application of instrumentation and connected sensors and other devices to machinery and vehicles. What that means in practice varies widely. Watch this 2-minute video to get up to...

Load More
You Might Also Like