How IoT Changes Security

Data Breach Today

Steve Rog of ForeScout Technologies on Improving Security Hygiene The growth of IoT means traditional methods of security are inadequate, says Steve Rog of ForeScout Technologies, who calls for improvements in security hygiene

IoT 208

Future-Proofing for IoT Risks

Data Breach Today

Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them Check Point's Robert Falzon on Preparing for the Changes to Come The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face.

IoT 149

Securing IoT: Is It Feasible?

Data Breach Today

consumers now own about 870 million IoT devices. In an interview, Al Pascual of Javelin Strategy & Research, discusses the challenges involved in securing the exploding IoT landscape

IoT 100

Experts Bemoan Shortcomings with IoT Security Bill

Threatpost

The infosec community say a recently approved IoT security bill is "nice," but doesn't hit on the important issues. IoT Vulnerabilities California Connected devices DDoS iot bill iot law iot password IoT security SB-327

IoT 63

AWS FreeRTOS Bugs Allow Compromise of IoT Devices

Threatpost

The bugs let hackers crash IoT devices, leak their information, and completely take them over. IoT Vulnerabilities amazon AWS FreeRTOS IoT security vulnerabilities

IoT 83

Podcast: Two Billion IoT Devices Still Vulnerable to BlueBorne Bug

Threatpost

Up to two billion devices are still vulnerable to the BlueBorne IoT attack - and may not ever get a patch. IoT Malware blueborne Bluetooth iot attack IoT security

IoT 73

FreeRTOS flaws expose millions of IoT devices to cyber attacks

Security Affairs

The researcher Ori Karliner and his team analyzed some of the most popular operating systems in the IoT market, including the FreeRTOS. FreeRTOS is an open-source operating system that runs on most of the small microprocessors and microcontrollers in IoT devices.

IoT 85

IoT Devices: Reducing the Risks

Data Breach Today

Attorney Steven Teppler, who recently wrote a report that addresses risks related to the internet of things, offers insights on risk management steps organizations in all sectors must take as IoT devices proliferate in the enterprise

IoT 112

Crypto Agility: Its Importance to IoT

Data Breach Today

Ted Shorter of CSS on the Need to Update Cryptographic Keys What is crypto agility, and why is it so important to IoT? Ted Shorter of Certified Security Solutions offers an explanation

IoT 130

Augmented Reality, IoT and Enterprise Content Management

OpenText Information Management

Augmented … The post Augmented Reality, IoT and Enterprise Content Management appeared first on OpenText Blogs. Cloud Enterprise Content Management augmented reality Big Data connected factory Extended ECM hololens IoT OpenText™ Extended ECM for Office 365

IoT 78

ThreatList: Malware Samples Targeting IoT More Than Double in 2018

Threatpost

A honeypot set up to sniff out data on infected IoT devices found a broad array of compromised devices – from Mikrotik routers to dishwashers. IoT Malware botnet Gafgyt IoT security malware mikrotek Mirai SSH Telnet

Yi IoT Home Camera Riddled with Code-Execution Vulnerabilities

Threatpost

Five of them allow remote compromise of the IoT gadgets, so attackers can intercept video feeds and more. Cloud Security IoT Vulnerabilities Cisco Denial of Service Internet of things remote code execution Talos video feed interception vulnerabilities yi camera

IoT 73

Hidden Costs of IoT Vulnerabilities

Dark Reading

IoT devices have become part of our work and personal lives. Unfortunately, building security into these devices was largely an afterthought

IoT 67

Podcast: Why Manufacturers Struggle To Secure IoT

Threatpost

Too often, many IoT device manufacturers are opting to leave out costly security features for their small, low power connected devices. . IoT Podcasts DDoS IoT IoT Consumer Device IoT Device IoT security Threatpost podcast

IoT 55

When It Comes To IoT Security, Liability Is Muddled

Threatpost

The onus behind IoT security has become so muddled that no one knows who to point fingers at. IoT Vulnerabilities hacked IoT device IoT Act IoT botnet IoT security Security of things

IoT 57

IoT Flaw Allows Hijacking of Connected Construction Cranes

Threatpost

Critical Infrastructure IoT Vulnerabilities connected things construction crane CVE-2018-17935 f25 hijacking spoofed commands telecrane vulnerabilityAn attacker can send spoofed commands to the crane's controller.

IoT 78

Chalubo, a new IoT botnet emerges in the threat landscape

Security Affairs

Security experts from Sophos Labs have spotted a new piece of IoT malware tracked as Chalubo that is attempting to recruit devices into a botnet used to launch DDoS attacks. The IoT malware ran only on systems with an x86 architecture. Securi ty Affairs – Chalubo, IoT botnet).

IoT 70

Improving IoT Security

Data Breach Today

Organizations in all sectors need to strive to adopt a standardized approach for ensuring that security is built into internet of things devices at the design phase, says Vinod Kumar, CEO and managing director at Bangalore-based Subex, a telecom analytics solutions provider

IoT 109

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape. What is infecting IoT devices and how? The first data that emerged from the study is that threat actors continue to look at the IoT devices with increasing interest.

IoT 74

Alleged ‘Satori’ IoT Botnet Operator Sought Media Spotlight, Got Indicted

Krebs on Security

Satori is a variant of the Mirai botnet , a powerful IoT malware strain that first came online in July 2016.

IoT 148

IoT Security: The Basics

Pwnie Express

This piece is part 1 of our ongoing series on IoT security. Don't forget to download the eBook to understand the IoT security gap and how your business needs to address it, today. IoT Security

eBook 46

The Danger and Opportunity in 5G Connectivity and IoT

Threatpost

The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world. Critical Infrastructure InfoSec Insider Mobile Security 5G Device security Encryption identity management infosec insider Internet of things IoT ixia multifactor authentication sensor networks steve mcgregory

IoT 75

New Report: IoT Now Top Internet Attack Target

Dark Reading

IoT devices are the top targets of cyberattacks -- most of which originate on IoT devices, new report finds

IoT 73

IoT: Moving to Security by Design

Data Breach Today

With the explosive growth of the internet of things, and the increasing threat posed by botnets that leverage IoT, more must be done to ensure IoT devices include security by design, says David Holmes, principal threat researcher at F5 Networks, who offers a strategy

IoT 103

IoT Inspector Tool from Princeton

Schneier on Security

Researchers at Princeton University have released IoT Inspector , a tool that analyzes the security and privacy of IoT devices by examining the data they send across the Internet. They've already used the tool to study a bunch of different IoT devices. Related: IoT Hall of Shame.

IoT 79

Torii botnet, probably the most sophisticated IoT botnet of ever

Security Affairs

Avast spotted a new IoT botnet, tracked as Torii, that appears much more sophisticated and stealth of the numerous Mirai variants previously analyzed. Security researchers spotted a new IoT botnet, tracked as Torii, that appears much more sophisticated and stealth of the numerous Mirai variants previously analyzed. The Torii IoT botnet stands out for the largest sets of architectures it is able to target. Security Affairs – Torii IoT botnet, hacking ).

IoT 71

Hide and Seek (HNS) IoT Botnet targets Android devices with ADB option enabled

Security Affairs

The Hide and Seek (HNS) IoT botnet was first spotted early this year, since its discovery the authors continuously evolved its code. It is currently the first IoT malware that implements a persistence mechanism to keep devices infected after reboots.

IoT 93

IoT Robot Vacuum Vulnerabilities Let Hackers Spy on Victims

Threatpost

IoT Vulnerabilities Web Security CVE-2018-10987 IoT security Vacuum vulnerabilityTwo vulnerabilities were discovered on Dongguan Diqee-branded vacuum cleaners, Thursday.

IoT 62

Review Shows Glaring Flaws In Xiongmai IoT Devices

Data Breach Today

Consulting Firm Alleges Security Not A Priority for Vendor Millions of internet-of-things devices made by the Chinese company Xiongmai and sold in stores such as Home Depot and Wal-Mart still have glaring security problems, a security consultancy warns. The findings come two years after the Mirai botnet targeted Xiongmai devices

IoT 151

Shellbot Botnet Targets IoT devices and Linux servers

Security Affairs

“The group distributes the bot by exploiting a common command injection vulnerability on internet of things (IoT) devices and Linux servers. The post Shellbot Botnet Targets IoT devices and Linux servers appeared first on Security Affairs.

IoT 94

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Data Security

The Internet of Things (IoT) is rapidly growing and expected to affect all industry verticals as well as our private lives. What is the biggest security challenge facing the growing IoT? For Secure IoT, all connected devices and services must have trusted identities.

IoT 99

Security Glitch in IoT Camera Enabled Remote Monitoring

Threatpost

After researchers found a security glitch that let them hack into an IoT camera, the manufacturer of the camera has fixed the issue. IoT Privacy hacked camera IoT camera IoT security Ozvision Swann camera

IoT 55

The IoT Hype Cycle

Information Matters

The IoT Hype Cycle. We know that last year Gartner placed the IoT at the Peak of Inflated Expectations on its annual hype cycle chart. Several observations: the search term “IoT” seems to have taken over from “Internet of Things” for general web searches.

IoT 52

7 Serious IoT Vulnerabilities

Dark Reading

A growing number of employees have various IoT devices in their homes - where they're also connecting to an enterprise network to do their work. And that means significant threats loom

IoT 67

A Cybersecurity Weak Link: Linux and IoT

Dark Reading

Linux powers many of the IoT devices on which we've come to rely -- something that enterprises must address

IoT 71

Black Hat Exclusive Video: The IoT Security Threat Looms for Enterprises

Threatpost

Armis' CTO discusses the top IoT security issues in the marketplace today - and whether device manufacturers will start to prioritize security. Black Hat IoT Videos Armis DDoS attack DEF CON IoT security

Video 73

Here’s how anyone with $20 can hire an IoT botnet to blast out a week-long DDoS attack

The Last Watchdog

A nascent cottage industry is starting to gel around DDoS botnets-for-hire , comprised of millions of compromised IoT devices. IoT botnets can be hired to execute smaller-scaled DDoS attacks designed to knock out a networked application, rather than a whole website. However, right now there’s so little effort needed to accumulate an IoT botnet that we’re seeing these underground DDoS-for-hire services coming down into the $15 per week range.”. IoT force multiplier.

IoT 198

The UK IoT Jobs Sector

Information Matters

It is a snapshot of vacant IoT positions across a range of employers. The report concludes with some thoughts on the strengths and weaknesses of the emerging UK IoT sector: Strengths. The post The UK IoT Jobs Sector appeared first on Information Matters. DOWNLOAD REPORT.

IoT 52

Who is Responsible for IoT Security?

Pwnie Express

This piece is part 4 of our ongoing series on IoT security. Don't forget to download the ebook to understand the IoT security gap and how your business needs to address it, today. IoT Security

eBook 51

IoT Threats Triple Since 2017

Dark Reading

Rapidly evolving malware is posing an ever-greater threat to the IoT - and business users of the Internet

IoT 61

5 top challenges the IoT presents to data transparency

Information Management Resources

There are several pressing issues related to the IoT and data transparency practices. These problems concern both businesses and consumers using IoT devices. Internet of things Data management Data strategy

NIST Cybersecurity Framework: IoT and PKI Security

Thales Data Security

Recently, NIST has been taking a closer look at the Internet of Things (IoT), inviting input on practical risks organizations face as they move into the age of connected devices. Put simply, trust is critical to the IoT.

IoT 105

From identity provisioning to managing IoT ecosystems

OpenText Information Management

The pace … The post From identity provisioning to managing IoT ecosystems appeared first on OpenText Blogs. Business Network Cloud Digital Transformation Enterprise World cybersecurity data security digital transformation IAM Identity information governance IoT

IoT 56