Internet of Things

Internet of Things | News, how-tos, features, reviews, and videos

5G mobile wireless network
DDOS attack

Technology as infrastructure / IoT / Internet of Things / Smart Home / building automation

Remote work raises threats from consumer IoT devices

With the rise of working from home, companies need to protect themselves against a wide range of consumer devices, including smart light bulbs.

medical network h/ ealthcare IoT / hospital connections and communications

Publicly known support credentials expose GE Healthcare imaging devices to hacking

The vulnerability gives hackers a means to access sensitive data, execute malicious code on devices and impact their operation.

iot internet of things chains security by mf3d getty

New US IoT law aims to improve edge device security

The Internet of Things Cybersecurity Improvement Act will require device manufacturers to meet new security standards for government contracts. Carryover effect expected for the private sector.

CSO  >  Botnet  >  Robots amid a blue binary matrix

InterPlanetary Storm cross-platform P2P botnet infects computers and IoT devices

IPStorm's ability to infect Android, macOS and Windows devices as well as those that are Linux-based makes it much more dangerous.

IDG Tech Spotlight  >  Edge Computing [ Network World (intro) / September 2020 ]

Edge computing: The next generation of innovation

The future of enterprise tech won't be confined to the data center mothership -- nor even the public cloud. Wedded to the internet of things, edge computing puts processing horsepower wherever it needs to go.

A hand holds a lightbulb swathed in leaves and surrounded by symbols of renewable energy.

Solar power shines light on security for the renewable energy industry

Solar power plants have massive numbers of vulnerable internet-connected devices. It's recent focus on cybersecurity is awakening the rest of the renewable energy industry to the threat.

5G mobile wireless network technology

8 ways 5G mobile networks will change IoT security, and how to prepare

Every internet of things security issue will be greatly magnified in a 5G environment. Address these eight areas before you deploy your own.

iot security

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them.

USA / United States Capitol Building / Congress / abstract digital infrastructure

New cybersecurity recommendations for US government target IoT, social media

The COVID-19 pandemic spurs the Cyberspace Solarium Commission policy initiative to issue a set of four security recommendations for the federal government in the wake of the crisis.

digital transformation world map outsourcing iot edge computing

4 ways edge computing changes your threat model

Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.

Cybersecurity lock with the abstract circuitry of a security fabric.

Securing IoT requires a shift to a security fabric

The IoT era and the expectation that everything will be connected, accelerates the need to move away from point products and toward the concept of a security fabric.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

tech spotlight iot cso thinkstock 510859324 2400x1600

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

CSO  >  Botnet

New, rapidly evolving IoT botnet Dark Nexus targets wide variety of devices

The sophisticated botnet also has high persistence and is capable of delivering different types of malware in addition to launching DDoS attacks.

5G light trails

4 ways 5G will change your enterprise threat model

The benefits that fifth-generation cellular networks will enable come with security risks that organizations need to pay attention to right now.

youtube thumbnails template 021020
video

Amazon, Microsoft and the JEDI cloud computing contract

The U.S. Department of Defense had two final choices to award its Joint Enterprise Defense Infrastructure (JEDI) cloud computing contract: Microsoft and Amazon. Despite perception of Amazon’s frontrunner status, the D.O.D. awarded the...

youtube thumbnails template
video

Making the move to 5G: What to know, how to plan for it

Is 5G real? When should you upgrade? How will enterprises benefit and what are the costs and ROI? Analyst Jack Gold joins IDG TECH(talk) hosts Juliet Beauchamp and Computerworld's Ken Mingis to answer those questions and more to help...

Internet of Things (IoT) / security alert / wireless network management

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk.

Load More