article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages. Related: Companies sustain damage from IoT attacks That was back in 1982.

IoT 279
article thumbnail

Malvertising Campaign Targets IoT Devices: GeoEdge

eSecurity Planet

A malicious advertising campaign originating out of Eastern Europe and operating since at least mid-June is targeting Internet of Things (IoT) devices connected to home networks, according to executives with GeoEdge, which offers ad security and quality solutions to online and mobile advertisers. Malvertising is Evolving.

IoT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Developments in IoT Security

Thales Cloud Protection & Licensing

Key Developments in IoT Security. Remember the early days of the emergence of Internet of Things (IoT) devices? The rush to market for consumers to enjoy the modern conveniences offered by these devices shocked the security community. Vulnerabilities have been discovered in many of these IoT devices.

IoT 100
article thumbnail

4 cyber security predictions for 2018

IT Governance

It’s a trend that Acentec CEO Jeff Mongelli predicts will only continue to increase: “It’s quite possible 2018 will mark a turning point in medical device security requirements as the likelihood of a major industry event increases as more vulnerabilities are discovered and exploited. Next, we had to worry about protecting our smartphones.

article thumbnail

What Is Penetration Testing? Complete Guide & Steps

eSecurity Planet

Limited tests can focus on narrower targets such as networks, Internet of Things (IoT) devices, physical security, cloud security, web applications, or other system components. Additionally, the methodology is updated and helps the security community stay on top of the latest technologies.

article thumbnail

Top Cybersecurity Companies for 2021

eSecurity Planet

NINJIO empowers organizations to be prepared for cyber threats through their engaging, video-based training courses. They recently received the ONLY "Customer's Choice" rating in Gartner's "Voice of the Customer” Security Awareness Computer-Based Training report. Visit website. Learn more about Check Point. Proofpoint.

article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

The internet of things (IoT), operations technology (OT), and the industrial internet of things (IIoT) also now connect to networks. Of course, such dynamic and fine-grain control currently is not technically feasible for most organizations. For better or worse, security can never be finished.