article thumbnail

Russia-linked STRONTIUM APT targets IoT devices to hack corporate networks

Security Affairs

The STRONTIUM Russia-linked APT group is compromising common IoT devices to gain access to several corporate networks. Researchers at Microsoft observed the Russia-linked APT group STRONTIUM abusing IoT devices to gain access to several corporate networks. ” IoT risk must be taken seriously. ” continues Microsoft.

IoT 74
article thumbnail

Ukrainian Blackjack group used ICS malware Fuxnet against Russian targets

Security Affairs

Industrial and enterprise IoT cybersecurity firm Claroty reported that the Ukrainian Blackjack hacking group claims to have damaged emergency detection and response capabilities in Moscow and beyond the Russian capital using a destructive ICS malware dubbed Fuxnet. ” reads the analysis published by Claroty.

IoT 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Three ways for agencies to prepare for the Internet of Things

CGI

The Internet of Things (IoT) will change many aspects of our daily lives. For example, right now, you sit in a chair and it supports your weight; but, in the not-too-distant-future, a similar chair might also measure your weight, and monitor your posture through the hours of your workday, alerting you when you slouch for too long.

IoT 40
article thumbnail

IoT - Haven’t we been here before?

CGI

IoT - Haven’t we been here before? Is IoT the game changer people believe it to be? The internet of things (IoT) is set to become a $20-$50bn industry over the next 5-10 years. An example is the water and oil and gas sector where millions of readings are collected every day. Tue, 09/08/2015 - 07:49.

IoT 40
article thumbnail

MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally

The Last Watchdog

This was all part of the Lehi, Utah-based vendor’s efforts to support enterprise cloud migration and the rise of IoT systems, which were both gaining steam. Honoring data sovereignty Name any business use case: banking, retail, healthcare, government, military, entertainment, elections. I’ll keep watch and keep reporting.

Cloud 147
article thumbnail

Have We Become Apathetic About Breaches?

Thales Cloud Protection & Licensing

Today, with the advent of the IoT, literally everything we do is measured, calibrated, recorded and loaded to a physical or virtual server. One such example is the recent disclosure that military personnel wearing Strava devices are revealing highly sensitive information about their locations and activities. Is Ignorance Bliss?

IoT 89
article thumbnail

Breaking the Ice on DICE: scaling secure Internet of Things Identities

The Security Ledger

In this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of solving a range of security and identity problems on low cost, low power IoT endpoints. Among them: establishing strong device.

IoT 40