IoT Security
IoT Security | News, how-tos, features, reviews, and videos
Engineering workstation attacks on industrial control systems double: Report
Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.
Portnox adds IoT fingerprinting to network access control service
The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.
Medical device vulnerability could let hackers steal Wi-Fi credentials
Vulnerabilities on battery units for medical infusion pump devices made by Baxter could allow for network access, DoS and man-in-the-middle attacks, highlighting IoT security issues and the need to properly decommission equipment,...
Barracuda report: Almost everyone faced an industrial attack in the last year
Major attacks on industrial systems are on the rise, yet security efforts to protect these systems continue to lag behind.
Dozens of insecure-by-design flaws found in OT products
The OT:ICEFALL report shows that makers of operational technology manufacturers have to improve the security of their devices.
Microsoft includes IoT devices under its Secured-core program
The Edge Secured-core, program is designed to validate IoT devices for specific security hardware technology, and ensure users that they are running an OS with built-in security technology.
Outdated IoT healthcare devices pose major security threats
Ransomware has emerged to become the worst nightmare in healthcare and hospital devices running on outdated Windows versions or open-source software like Linux are the easy targets, according to research by Cynerio.
NIST gears up for software security and IoT labeling pilot programs
Intended to help consumer make more secure software and IoT device purchases, the labeling guidelines are voluntary and self-policing at this time.
Flaws in the Nucleus embedded TCP/IP stack puts critical systems at risk
The NUCLEUS:13 vulnerabilities can allow remote code execution or denial of service attacks. Billions of devices could be affected.
BusyBox flaws highlight need for consistent IoT updates
Some of the 14 vulnerabilities could result in remote code execution or denial of service attacks.
Securing the edge: 4 trends to watch
The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.
BlackBerry faces bad PR by failing to go public with BadAlloc vulnerability
Although the company informed its OEM customers of the vulnerability, users of IoT devices running its QNX OS were potentially kept in the dark.
IoT devices have serious security deficiencies due to bad random number generation
It's not the IoT vendors' fault. Lack of a cryptographically secure pseudo-random number generator subsystem for the internet of things devices will be vulnerable.
Serious flaws in widespread embedded TCP/IP stack endanger industrial control devices
Critical vulnerabilities potentially affect millions of devices, but finding and patching them will be difficult.
The race to secure 5G
The arrival of 5G technology introduces a new era of digital transformation. Security can't be an afterthought.
Tech Primer
What it takes to become an information assurance analyst
This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...
Tech Primer
Fraud prevention: Improving internal controls
Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.
Tech Primer