Internet of Things
Internet of Things | News, how-tos, features, reviews, and videos
PLC vulnerabilities can enable deep lateral movement inside OT networks
Researchers demonstrate how attackers can target PLCs to bypass authentication and perform remote code execution on industrial networks.
Flaws in industrial wireless IoT solutions can give attackers deep access into OT networks
Greater use of industrial cellular gateways and routers expose IIoT devices to attackers and increase the attack surface of OT networks.
IoT, connected devices biggest contributors to expanding application attack surface
New report shines light on application security challenges impacting global businesses.
Are robots too insecure for lethal use by law enforcement?
The San Francisco Police Department wants to use weaponized robots, but some experts say robots suffer from severe security flaws that render them too dangerous for such use.
The cybersecurity challenges and opportunities of digital twins
The virtual representation of objects or systems through digital twins provide organizations greater insight into their assets but it can also invite malicious actors.
Palo Alto Networks looks to shore up healthcare IoT security
Machine-learning based visibility and monitoring are at the heart of the cybersecurity company’s new healthcare-focused, add-on application to its core firewall products.
Engineering workstation attacks on industrial control systems double: Report
Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.
Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC
UK National Cyber Security Centre’s Lindy Cameron calls for clear, workable international standards to improve the cybersecurity of the internet of things (IoT), connected devices, and smart cities.
Tips on securing IoT devices gleaned from enterprises that use them
IoT devices pose significant threats to enterprises because of lack of visibility into what devices are on enterprise networks and inadequate use of monitoring tools to watch for malicious behaviors.
Portnox adds IoT fingerprinting to network access control service
The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.
Medical device vulnerability could let hackers steal Wi-Fi credentials
Vulnerabilities on battery units for medical infusion pump devices made by Baxter could allow for network access, DoS and man-in-the-middle attacks, highlighting IoT security issues and the need to properly decommission equipment,...
Universal database of device vulnerability information launched
DeviceTotal's new repository includes security data for all devices on the market with the aim to better mitigate vulnerabilities.
GPS trackers used for vehicle fleet management can be hijacked by hackers
At least one model of GPS tracking devices made by Chinese firm MiCODUS "lacks basic security protections needed to protect users from serious security issues."
Barracuda report: Almost everyone faced an industrial attack in the last year
Major attacks on industrial systems are on the rise, yet security efforts to protect these systems continue to lag behind.
Dozens of insecure-by-design flaws found in OT products
The OT:ICEFALL report shows that makers of operational technology manufacturers have to improve the security of their devices.
Microsoft includes IoT devices under its Secured-core program
The Edge Secured-core, program is designed to validate IoT devices for specific security hardware technology, and ensure users that they are running an OS with built-in security technology.
7 machine identity management best practices
Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.
Fragmented tool landscape biggest cybersecurity challenge to medical device makers
Continuous monitoring of security throughout the medical device product lifecycle also poses problems.