Singapore Launches IoT Cybersecurity Labelling

Data Breach Today

Labels Will Indicate What Security Standards Products Meet Singapore has launched an IoT cybersecurity labelling program intended to improve the baseline security of internet-connected consumer products.

IoT 225

New Online Platform Coordinates IoT Bug Reports

Data Breach Today Seeks to Improve Bug Reporting for Connected Devices A new online platform called is aiming to become the go-to place for reporting and viewing reports on software flaws in IoT devices.

IoT 239

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

IoT Security Dangers Loom as Office Workers Return

Data Breach Today

This is particularly true of IoT devices, as many have been left unprotected for months

IoT 252

Malvertising Campaign Targets IoT Devices: GeoEdge

eSecurity Planet

A malicious advertising campaign originating out of Eastern Europe and operating since at least mid-June is targeting Internet of Things (IoT) devices connected to home networks, according to executives with GeoEdge, which offers ad security and quality solutions to online and mobile advertisers.

IoT 114

KrebsOnSecurity Hit By Huge New IoT Botnet “Meris”

Krebs on Security

The assault came from “ Meris ,” the same new “Internet of Things” (IoT) botnet behind record-shattering attacks against Russian search giant Yandex this week and internet infrastructure firm Cloudflare earlier this summer.

IoT 186

FireEye, CISA Warn of Critical IoT Device Vulnerability

Data Breach Today

Researchers: Kalay Protocol Flaw Could Affect Millions of Connected Devices FireEye researchers and CISA are warning about a critical vulnerability that could allow an attacker to gain remote access to compromised IoT devices, such as connected security cameras, according to a report.

IoT 205

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

During a two-week period in December 2020, Zscaler analyzed more than 575 million device transactions and blocked more than 300,000 malware attacks aimed at IoT devices, a 700 percent increase over pre-pandemic numbers. Cloud IoT security remote workforce security

IoT 113

IoT Attacks Skyrocket, Doubling in 6 Months


IoT Most Recent ThreatListsThe first half of 2021 saw 1.5 billion attacks on smart devices, with attackers looking to steal data, mine cryptocurrency or build botnets.

Mining 102

New Fido Protocol Simplifies IoT Device Onboarding

Data Breach Today

Standard Designed to Cut the Cost and Time to Securely Connect IoT Devices The Fido Alliance, an association that has developed voluntary authentication standards with a goal of minimizing the use of passwords, has launched an onboarding protocol for IoT devices that's designed to enhance security

IoT 160

Gartner on Enterprise IoT: Segment and Isolate Everything

Data Breach Today

Tim Zimmerman Says Organizations Need IoT Security Policies What's that IoT device on your network? That's why Gartner analyst Tim Zimmerman says enterprises need to create IoT security policies and governance rules to reduce risk

IoT 195

IoT Advantages & Disadvantages

Record Nations

The term IoT may be new to some, but the expression has been around since roughly 1999. IoT stands for “the internet of things.” The post IoT Advantages & Disadvantages appeared first on Record Nations.

IoT 52

Podcast: IoT Piranhas Are Swarming Industrial Controls


Enormous botnets of IoT devices are going after decades-old legacy systems that are rife in systems that control crucial infrastructure. Critical Infrastructure IoT Malware Podcasts Vulnerabilities Web Security

IoT 113

Analysis: Keeping IoT Devices Secure

Data Breach Today

This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity

IoT 162

Researchers: IoT Botnets Could Influence Energy Prices

Data Breach Today

Paper Describes How Connected Devices Could Be Used to Manipulate Markets High-wattage IoT devices and appliances, such as connected refrigerators, air conditioners and heaters, could be turned into massive botnets by malicious actors and used to influence energy prices, according to an academic study released at Black Hat 2020.

IoT 212

New Charges, Sentencing in Satori IoT Botnet Conspiracy

Krebs on Security

Justice Department today criminally charged a Canadian and a Northern Ireland man for allegedly conspiring to build botnets that enslaved hundreds of thousands of routers and other Internet of Things (IoT) devices for use in large-scale distributed denial-of-service (DDoS) attacks. The U.S.

IoT 207

How Amazon and Walmart Could Fix IoT Security

Data Breach Today

Bruce Schneier Says Pressure on Retailers Could Fix Insecure IoT Supply Chains IoT devices can be made cheaply and quickly. But as a result, they may lack adequate security features.

IoT 225

Survey: Security Concerns Slow Down IoT Deployments

Data Breach Today

Preventing Ransomware and Other Malware Attacks Is Top of Mind for Enterprises Worries over ransomware and malware are slowing down enterprise IoT deployments, which is a reflection of the reputational and customer relationship risks at stake, according to a new survey.

IoT 189

US House Passes IoT Cybersecurity Improvement Act

Security Affairs

House of Representatives passed the IoT Cybersecurity Improvement Act, a bill that aims at improving the security of IoT devices. House of Representatives last week passed the IoT Cybersecurity Improvement Act, a bill designed to improve the security of IoT devices.

IoT 109

IoT Vendor Sierra Wireless Reports Ransomware Attack

Data Breach Today

Multiple Systems Impacted, Including Manufacturing and Internal IT Operations The Canadian Internet of Things manufacturer Sierra Wireless reported today it had suffered a ransomware attack over the weekend, forcing it to halt production at its manufacturing sites.

IoT 225

IoT Supply Chains: Where Risks Abound

Data Breach Today

ENISA Releases Guidance on Reducing IoT Supply Chain Risk IoT devices are like sausages: They're full of components of varying quality, and it's invariably disturbing to think about their origins.

IoT 154

Ransomware Attack Foils IoT Giant Sierra Wireless


The ransomware attack has impacted the IoT manufacturer's production lines across multiple sites, and other internal operations. Hacks IoT Malware

'Heh' Botnet Targets Telnet on IoT Devices

Data Breach Today

Researchers Say Bot Code Could Wipe Disks Clean Security researchers with the Chinese company Qihoo say they've spotted a new IoT botnet that brute forces telnet ports on routers and other devices and is coded with a command to erase infected devices

IoT 176

Even in Test Mode, New Mirai Variant Infecting IoT Devices

Data Breach Today

Researchers: 'Katana' Features Many Enhancements A greatly enhanced variant of the powerful Mirai botnet is already infecting IoT devices even though it's operating in a test environment, according to researchers at cybersecurity firm Avira Protection Lab

IoT 209

Federal IoT Guidelines Move Closer to Becoming Law

Data Breach Today

IoT Products Would Have to Meet Minimum Security Requirements for Use by Government Legislation that establishes minimum security standards for IoT devices procured by the federal government is moving closer to becoming law.

IoT 200

How IoT Changes Security

Data Breach Today

Steve Rog of ForeScout Technologies on Improving Security Hygiene The growth of IoT means traditional methods of security are inadequate, says Steve Rog of ForeScout Technologies, who calls for improvements in security hygiene

IoT 160

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. Are these examples actually risks in IoT? IoT firmware should be self-healing. IoT Security

IoT 97

2019 IoT Security Outlook

Data Breach Today

DigiCert just conducted a global study of how organizations across sectors are approaching IoT security. What are some of the best practices of the organizations that emphasize securing connected devices? Mike Nelson of DigiCert shares the findings

IoT 145

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

billion Internet of Things (IoT) devices. As more information about IoT device vulnerabilities is published, the pressure on industry and government authorities to enhance security standards might be reaching a tipping point. Implications for IoT devices.

IoT 113

The IoT Application Checklist

RFID Global Solution, Inc.

It was Kevin Ashton, co-founder of MIT’s Auto-ID Center, who first used … The IoT Application Checklist Read More ». The post The IoT Application Checklist appeared first on RFID Global Solution. Blog IoT iot applications iot platform

IoT 52

Kaiji Botnet Targets Linux Servers, IoT Devices

Data Breach Today

Researchers: Malware Is Capable of Launching DDoS Attacks Kaiji, a newly discovered botnet, is compromising Linux servers and IoT devices using brute-force methods that target the SSH protocol, according to the security firm Intezer.

IoT 183

Researchers: 61M Health IoT Device User Records Exposed

Data Breach Today

Database Belonged to a Firm That Apparently Just Shut Down An unsecured database belonging to an apparently recently defunct firm exposed 61 million records of wearable health and fitness device users on the internet, say the security researchers who discovered the non-password-protected database in cooperation with the WebsitePlanet research team.

IoT 147

IBM Finds Flaw in Millions of Thales Wireless IoT Modules

Data Breach Today

Insulin Pumps Could Be Manipulated and Smart Meters Could Be Wrecked, IBM Warns A patching effort has been underway for six months to upgrade Thales wireless communication modules that are embedded in millions of IoT devices, including insulin pumps and smart meters.

IoT 206

IoT Cybersecurity Improvement Act Passed, Heads to President’s Desk


Security experts praised the newly approved IoT law as a step in the right direction for insecure connected federal devices.

IoT 106

Securing Industrial IoT: It’s All About the Architecture

Data Breach Today

Organizations are connecting to industrial control networks at an increasing pace. The need to connect to the IT environment, cloud applications and remote workers has created a definitive gap by eroding the demilitarized zone.

IoT 215

The Role of 'Prosilience' in IoT Security

Data Breach Today

The latest edition of the ISMG Security Report features a discussion of the role of "prosilience" in IoT security, plus the problem of overnotification under GDPR and the notion of "Spartacus as a Service

IoT 190

Coming Soon: 'Trust Mark' Certification for IoT Devices

Data Breach Today

Program, Which Could Become Global, Designed to Evaluate Security of Connected Devices An Australian IoT alliance is developing a certification program designed to raise security standards for connected device manufacturers and give consumers more confidence that they're buying secure devices.

IoT 210

Hacked IoT Devices Livestreaming Swatting Attacks: FBI

Adam Levin

The post Hacked IoT Devices Livestreaming Swatting Attacks: FBI appeared first on Adam Levin. Data Security Technology featured hacking IoT swatHackers are using internet-connected home devices to livestream “swatting” attacks, according to the FBI.

IoT 99

Can Nanotech Secure IoT Devices From the Inside-Out?


Work's being done with uber-lightweight nanoagents on every IoT device to stop malicious behavior, such as a scourge of botnet attacks, among other threats. IoT Malware Mobile Security RSAC Vulnerabilities

IoT 107

More Than 1,000 IoT Security Guidelines: Which One to Use?

Data Breach Today

Study Suggests Actionable Recommendations Would Improve IoT Security With more than 1,000 IoT security guidelines, recommendations and best practices, which ones should an organization follow?

IoT 173

Attackers Exploit Flaw that Could Impact Millions of Routers, IoT Devices

eSecurity Planet

In a recent blog post , the researchers said the bad actors are looking to leverage a path traversal vulnerability that could affect millions of home routers and other Internet of Things (IoT) devices that use the same code base and are manufactured by at least 17 vendors.

IoT 113