‘Satori’ IoT Botnet Operator Pleads Guilty

Krebs on Security

Satori was originally based on the leaked source code for Mirai , a powerful IoT botnet that first appeared in the summer of 2016 and was responsible for some of the largest denial-of-service attacks ever recorded (including a 620 Gbps attack that took KrebsOnSecurity offline for almost four days ).

IoT 285

Fixing IoT Leaks with Hardware Security

Data Breach Today

Brian Romansky of Owl Cyber Defense Discusses the Role of Data Diodes Data diodes provide a way to control data flows in IoT devices, says Brian Romansky of Owl Cyber Defense, who describes "unhackable" hardware

IoT 205

How IoT Changes Security

Data Breach Today

Steve Rog of ForeScout Technologies on Improving Security Hygiene The growth of IoT means traditional methods of security are inadequate, says Steve Rog of ForeScout Technologies, who calls for improvements in security hygiene

IoT 208

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders. If the code stamped on your IoT device begins with one of these, it is vulnerable.

IoT 286

2019 IoT Security Outlook

Data Breach Today

DigiCert just conducted a global study of how organizations across sectors are approaching IoT security. What are some of the best practices of the organizations that emphasize securing connected devices? Mike Nelson of DigiCert shares the findings

IoT 160

Countering Attacks That Leverage IoT

Data Breach Today

Eddie Doyle of Checkpoint Software on Mitigation Strategies How are cybercrime syndicates launching attacks that leverage IoT devices? Eddie Doyle of Check Point Software Technologies offers insights on the latest attack strategies and how to counter them

IoT 181

5G and IoT: How to Approach the Security Implications

Threatpost

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).

IoT 114

Extinguishing the IoT Insecurity Dumpster Fire

Threatpost

Or will legislation - such as the recent UK mandate announced this week - help boost IoT security? IoT Podcasts Privacy DDoS attack IoT security iot security solution P2P PKI uk iot regulation US IoT BillWill connected devices be insecure forever?

IoT 87

Cataloging IoT Vulnerabilities

Schneier on Security

Recent articles about IoT vulnerabilities describe hacking of construction cranes , supermarket freezers , and electric scooters. hacking internetofthings vulnerabilities

IoT 109

The Role of 'Prosilience' in IoT Security

Data Breach Today

The latest edition of the ISMG Security Report features a discussion of the role of "prosilience" in IoT security, plus the problem of overnotification under GDPR and the notion of "Spartacus as a Service

IoT 193

Gucci IOT Bot Discovered Targeting European Region

Security Affairs

Security Labs discovered a new IOT bot named “GUCCI”. It seems like the IOT botnet is named after an Italian luxury brand of fashion and leather goods. The IOT threat detection engine picked the infection IP has shown below hosting number of bins for different architectures.

IoT 108

IoT Security Woes Plague Healthcare Industry

Threatpost

Hospitals and IoT device manufacturers must take a dual approach in securing connected telehealth devices. IoT Vulnerabilities Connected devices Cybersecurity enfuse 2019 Healthcare Internet of things iot medical IoT regulation Medical device security regulation SB-327

Actionable Threat Intel in the IoT Era

Data Breach Today

Vishak Raman of Cisco on Coping With the Expanding Attack Surface The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface.

IoT 194

2 Million IoT Devices Have P2P Software Flaw: Researcher

Data Breach Today

Vulnerabilities Found in Security Cameras, Baby Monitors and More An independent security researcher is warning about a vulnerability in peer-to-peer software used in millions of IoT devices that could allow a hacker to eavesdrop on conversations or turn these items into a botnet

IoT 249

Managing IoT Risks: Reinventing Security

Data Breach Today

Security needs to be reinvented for the internet of things, and start-up companies can play a critical role, says Robin Saxby, the former CEO and founder of Arm Holdings, a U.K.-based based semiconductor company, who now invests in start-up firms

IoT 155

Future-Proofing for IoT Risks

Data Breach Today

Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them Check Point's Robert Falzon on Preparing for the Changes to Come The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face.

IoT 169

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack

Threatpost

IoT Vulnerabilities 1 million devices Cyberattacks imperial dabman iot radio telnet backdoor vulnerability Vulnerability Lab weak passwordAttackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.

IoT 114

Exclusive: MalwareMustDie analyzes a new IoT malware dubbed Linux/ AirDropBot

Security Affairs

After 2 years of waiting, MalwareMustDie returns with an excellent page of malware analysis of a new IoT malware: Linux/AirDropBot. The beginning of the story: another IoT malware in the wild? Coming to the core topic: IoT botnet threat and their ecosystem.

IoT 112

RSA Conference 2019: Firms Continue to Fail at IoT Security

Threatpost

IoT is growing more popular in the home - and so too are the attacks that target these devices featuring valuable data, researchers said at RSA 2019. Hacks IoT Videos AEG smart scale iot hack IoT security Smart Home smart scale

IoT 113

Experts Bemoan Shortcomings with IoT Security Bill

Threatpost

The infosec community say a recently approved IoT security bill is "nice," but doesn't hit on the important issues. IoT Vulnerabilities California Connected devices DDoS iot bill iot law iot password IoT security SB-327

IoT 87

Attacks Targeting IoT Devices and Windows SMB Surge

Data Breach Today

IoT 260

Thousands of IoT Devices Bricked By Silex Malware

Threatpost

IoT Malware Newsmaker Interviews Podcasts brick iot BrickerBot DDoS hacker Internet of things IoT security malware Mirai silexA 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week.

IoT 114

D-Link Settles With FTC Over Alleged IoT Security Failures

Data Breach Today

Federal Trade Commission, which alleged the IoT device developer left consumers vulnerable to hackers through inadequate security practices. The terms of the settlement may serve as a warning to IoT makers to get their security checks in order Proposed Settlement Requires D-Link to Bolster Security Program D-Link has reached a proposed settlement with the U.S.

IoT 162

What BYOD can teach us about dealing with shadow IoT

OpenText Information Management

In its place, another security risk is coming to the fore: shadow IoT. Research shows that shadow IoT is … The post What BYOD can teach us about dealing with shadow IoT appeared first on OpenText Blogs.

IoT 52

A hacker has taken over at least 29 IoT botnets

Security Affairs

Hacker “Subby” brute-forces the backends of 29 IoT botnets that were using weak or default credentials. A hacker that goes online with the moniker ‘Subby’ took over 29 IoT botnets in the past few week s with brute-force attacks.

IoT 114

Consumers Urged to Junk Insecure IoT Devices

Threatpost

A security researcher who disclosed flaws impacting 2 million IoT devices in April - and has yet to see a patch or even hear back from the manufacturers contacted - is sounding off on the dire state of IoT security.

IoT 114

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked

Security Affairs

A security researcher disclosed zero-day flaws in Telestar Digital GmbH IoT radio devices that could be exploited by remote attackers to hijack systems without any user interaction. SecurityAffairs – IoT radio devices, hacking). .

IoT 112

Congress Considers IoT Cybersecurity Legislation - Again

Data Breach Today

Third Attempt at Setting Minimum Standards for Devices Government Uses The U.S.

IoT 222

Securing IoT: Is It Feasible?

Data Breach Today

consumers now own about 870 million IoT devices. In an interview, Al Pascual of Javelin Strategy & Research, discusses the challenges involved in securing the exploding IoT landscape

IoT 100

Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger

Threatpost

IoT Vulnerabilities API Bluetooth connected home Hickory Smart BlueTooth Enabled Deadbolt IoT security Privacy vulnerability

IoT 114

Yet Another IoT Cybersecurity Document

Schneier on Security

This one is from NIST: " Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks." It's still in draft. Remember, there are many others. cybersecurity internetofthings nist

IoT 112

Podcast: Why Manufacturers Struggle To Secure IoT

Threatpost

Too often, many IoT device manufacturers are opting to leave out costly security features for their small, low power connected devices. . IoT Podcasts DDoS IoT IoT Consumer Device IoT Device IoT security Threatpost podcast

Measuring the Security of IoT Devices

Schneier on Security

In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software.

IoT 113

New IoT Security Regulations

Schneier on Security

While the US government is largely absent in this area of consumer protection, the state of California has recently stepped in and started regulating the Internet of Things, or "IoT" devices sold in the state­and the effects will soon be felt worldwide.

IoT 114

News Wrap: IoT Radio Telnet Backdoor And ‘SimJacker’ Active Exploit

Threatpost

Hacks IoT Malware Podcasts backdoor data expose database elasticsearch server IoT security podcast sim simjacker TelnetThreatpost editors Tara Seals and Lindsey O'Donnell talk about the top news stories of the week - from leaky databases to SIM card attacks.

IoT 87

Business Models for the Internet of Things (IoT)

Information Matters

Building Business Models for the Internet of Things (IoT): a Literature Review Abstract This paper presents a comprehensive literature review of research relating to IoT business models. The post Business Models for the Internet of Things (IoT) appeared first on Information Matters.

IoT 52

IoT Security Challenges in a 5G Era: Expert Advice

Threatpost

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar replay.

IoT 112