Internet of Things

mute google home amazon echo
rings neighbors app

05 iot

‘I'm hacked’ message left on dozens of defaced Canon IoT security cameras in Japan

More than 60 Canon IoT security cameras in Japan were hacked and defaced -- another example of why users must change default passwords.

iot security networking privacy

Intentional Electromagnetic Interference (IEMI) – the overlooked threat to IoT

As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks to IoT. Yet, even among the IoT security professionals, one significant potential remote attack vector is often...

rsa conference 2017

Quick take-aways from the RSA Security Conference

Last week's RSA Security Conference had good discussions and industry focus, but there was too much hype -- and there's lots of work ahead.

cils 011 technologysthat will disrupt 2
video

Technologies that will disrupt business in 2018

From artificial intelligence to augmented reality, these dozen disruptive technologies and trends will begin driving how business gets done at forward-thinking organizations this year.

mobile security stock image one bad device

Don’t rush to deploy 5G if you want IoT security, agency warns

Flaws in 2G, 3G and 4G networks could be repeated in 5G, says EU IT security agency.

iot security

Transparency, responsibility and accountability in the age of IoT

The security industry can play a lead role in providing the tools to make it easier for IoT manufacturers and organizations to make "security by default" a business priority.

supply chain management logistics - ERP - Enterprise Resource Planning

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

abstract industrial iot internet of things

Eliminate the IoT security blind spot

Securing the new endpoint: Making the IoT transformation safe for enterprises.

security threats and vulnerabilities

Severe flaws could turn your smart camera into someone else's surveillance tool

Researchers from Kaspersky Lab ICS CERT found 13 severe security flaws that could turn a popular smart camera into a device an attacker could use to spy on you.

gavels on a table governance compliance legal

Regulation is the best hope for IoT security – imagine that!

Far from stifling technological innovation, regulation could in fact create lucrative new opportunities for security vendors.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

bunch of toy robots

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.

hacker, laptop, binary code, world map

U.S. cybersecurity threat risk remains high -- no signs of lessening

The U.S. Director National Intelligence says the public and private sectors in the U.S. are at continual risk and the country should expect cyber attacks from nation state and non-state actors.

trv 005 bestamazonecho

Alexa, ask McAfee to scan my network

At Mobile World Congress 2018, McAfee said it plans to launch Secure Home Platform (SHP) for Amazon Alexa, so a connected home’s network security can be managed via voice.

Q&A

How do mobile apps impact security in the Industrial IoT?

New research from IOActive looks at the rise in vulnerabilities of mobile apps which connect to SCADA systems – we catch up with Jason Larsen to learn more

little girl sunglasses bright future predictions big data

What cybersecurity surprises does 2018 hold?

One thing's for sure: securing ourselves and our organizations will only get more difficult this year.

sequence 01.00 00 31 14.still001
video

Mingis on Tech: A preview of Mobile World Congress 2018

This year's big show in Barcelona begins Feb. 26, and while hardware announcements are always part of the event, attendees are more likely to hear a lot about 5G networking.

network security digital internet firewall binary code

Defending outside the firewall

The risks and rewards of the intelligent edge.

Load More