Internet of Things

Internet of Things | News, how-tos, features, reviews, and videos

tre18 007 nestnews2

Hijacked Nest camera blares warning about North Korean missiles headed to U.S.

A hacker hijacked a Nest security camera and blasted a warning about three North Korean intercontinental ballistic missiles headed to Los Angeles, Chicago, and Ohio.

ermergency reponse siren

Data from smartwatch provided ‘key evidence’ against hitman

Police used data from a Garmin GPS watch to help get a man convicted for killing a crime boss known as Mr. Big.

facial recognition - biometric security identification

Police can't force you to unlock your phone with face, finger or any biometrics

A judge in California ruled that law enforcement officials can’t force people to unlock their smartphones with a finger or thumbprint, facial recognition, or even an iris.

1 weakest link broken rusted chain security breach hacked

Vulnerabilities found in building access system used by schools, governments

Tenable Research discovered four zero-day vulnerabilities in IDenticard's PremiSys access control system, which is used by schools, governments, medical centers, and Fortune 500 companies. Currently no patches are available.

alarm ambulance emergency red

Australian emergency warning system hacked, thousands receive alerts

A hacker took control of Australia’s Early Warning Network and sent an alert to thousands that said their personal data is not safe.

Twitter

Twitter bug may have been exploited by state-sponsored hackers

A flaw in Twitter support forum API may have been exploited by state-sponsored hackers. Meanwhile, other hackers embedded code in memes posted on Twitter to give infected PCs instructions.

city network monitoring cityscape

Review: Continuous cybersecurity monitoring with CyCognito

The CyCognito platform studies networks the same way that hackers do, from the outside with no help or internal bias inserted into the process.

blue green abstract finger print identity bio security fingerprint

IAM for IoT: Taming the internet of threats

We don’t simply give users credentials and allow unfettered access to the network, why wouldn't we apply the same controls to a networked device?

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Who is responsible for IoT security in healthcare?

NIST panel debates who should own IoT security: vendors or users. The issue is especially important when it comes to protecting medical devices.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

BlackBerry's acquisition of Cylance raises eyebrows in the security community

BlackBerry's move into the endpoint security game may create public safety issues, given the company's history with encryption backdoors, experts say.

2 industrial iot utility nuclear plant power plant

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what's wrong and best practices for fixing it.

hovering drone / camera / propellor blades

Critical authentication flaw in DJI drone web app fixed

Check Point researcher finds vulnerability that could have allowed attackers to spy on drone fleets in real time.

industrial iot robotics ai automation programmin code

Why fake data is a serious IoT security concern

IoT devices create massive amounts of data, all which could be polluted to throw off operations, business decisions, and even machine learning models.

5 small business security

Beware the IoT spy in your office or home via smart furniture, warns NSA

NSA discussed potential security and privacy issues of connected office furniture.

1 network internet connected grid earth power satellite view

Thousands of critical energy and water systems exposed online for anyone to exploit

Critical functions such as starting or stopping a system can be accessed online by anyone, be it nation-state attackers or script kiddies.

a digital brain and circuit board

Flaws in brain stimulation tech could let hackers erase or hold memories for ransom

If security flaws in brain stimulation tech are not fixed, researchers warn that hackers will be able to target your memories, erase them or hold them for ransom in the future.

1 tsunami

The IoT tsunami is coming

The Internet of Things will change everything, in all sectors...and you'd better have a plan.

lenovo tab 4 alexa mute

Amazon patent gives Alexa ability to detect illness, 'emotional abnormality'

Amazon's Alexa may one day detect your real-time status, if you're sick, or if you have an "emotional abnormality" and target you with ads based on the voice analysis.

windows bug

Microsoft patch for JET flaw zero-day is ‘incomplete,’ Windows still vulnerable

Microsoft's fix for the zero-day JET flaw only limits the vulnerability, doesn't eliminate it. Meanwhile, a Pentagon breach affects 30,000 workers, and a vigilante hacker is patching vulnerable MikroTik routers.

medical network h/ ealthcare IoT / hospital connections and communications

Securing connected medical devices: Will categorizing them as ICS help?

Now that they’re no longer protected by an “air gap,” let’s consider what’s needed to protect connected medical devices from security threats.

Load More
You Might Also Like