article thumbnail

MY TAKE: New tech standards, like ‘Matter’ and ‘BIMI,’ point the way to secure interoperability

The Last Watchdog

This is precisely what the consortium of software companies and device manufacturers, led Google, Amazon and Apple, set out to achieve when Matter was conceived four years ago. It’s important that as consumers are shopping for these smart home devices that they learn to recognize the Matter trademark so that they can make educated decisions.”

Security 229
article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

The only way to tackle this challenge is to educate the users about these threats and their potential implications. The Flaws in Manufacturing Process. Manufacturers saw this as an opportunity and rushed in to grab their own piece of the IoT market. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

IoT 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China-linked APT Volt Typhoon remained undetected for years in US infrastructure

Security Affairs

In the most recent campaign, the group targeted organizations in the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors. The Volt Typhoon group has been active since at least mid-2021 it carried out cyber operations against critical infrastructure.

article thumbnail

Nexx bugs allow to open garage doors, and take control of alarms and plugs

Security Affairs

A series of vulnerabilities in multiple smart devices manufactured by Nexx can be exploited to remotely open garage doors, and take control of alarms and plugs. Below is a video demo published by the researcher that shows how to exploit the flaw CVE-2023–1748 to obtain users’ info.

article thumbnail

Volvo retailer leaks sensitive files

Security Affairs

The Brazilian retail arm of car manufacturing giant Volvo leaked sensitive files, putting its clientele in the vast South American country in peril. Other research by Cybernews has revealed that BMW , a German luxury vehicle manufacturer producing around 2.5 How to protect your data? The issue causing the leak has been fixed.

Retail 91
article thumbnail

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

What has yet to be seen is how successful this approach will be in increasing universal IoT security standards. Also Read: Edge Security: How to Secure the Edge of the Network. While SP 800-213 applies to federal agencies, the latter three are specific to IoT manufacturers. Guidance for Manufacturers. Data protection.

IoT 144
article thumbnail

How to Foster Innovation within Your Organization

Synergis Software

I had the pleasure of attending the Delaware Valley Industrial Resource Center (DVIRC) Manufacturing Summit on October 12 at The Fuge in Warminster where Valerie Gervais was a featured keynote. The “skilled workforce” issue is a major challenge for many manufacturing companies today, and St. VP HR, Saint-Gobain. Count me in!