How IoT Changes Security

Data Breach Today

Steve Rog of ForeScout Technologies on Improving Security Hygiene The growth of IoT means traditional methods of security are inadequate, says Steve Rog of ForeScout Technologies, who calls for improvements in security hygiene

IoT 208

IoT Security Woes Plague Healthcare Industry


Hospitals and IoT device manufacturers must take a dual approach in securing connected telehealth devices. IoT Vulnerabilities Connected devices Cybersecurity enfuse 2019 Healthcare Internet of things iot medical IoT regulation Medical device security regulation SB-327

IoT 111

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Fixing IoT Leaks with Hardware Security

Data Breach Today

Brian Romansky of Owl Cyber Defense Discusses the Role of Data Diodes Data diodes provide a way to control data flows in IoT devices, says Brian Romansky of Owl Cyber Defense, who describes "unhackable" hardware

IoT 205

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders. If the code stamped on your IoT device begins with one of these, it is vulnerable.

IoT 282

‘Satori’ IoT Botnet Operator Pleads Guilty

Krebs on Security

Satori was originally based on the leaked source code for Mirai , a powerful IoT botnet that first appeared in the summer of 2016 and was responsible for some of the largest denial-of-service attacks ever recorded (including a 620 Gbps attack that took KrebsOnSecurity offline for almost four days ).

IoT 225

2019 IoT Security Outlook

Data Breach Today

DigiCert just conducted a global study of how organizations across sectors are approaching IoT security. What are some of the best practices of the organizations that emphasize securing connected devices? Mike Nelson of DigiCert shares the findings

IoT 160

Countering Attacks That Leverage IoT

Data Breach Today

Eddie Doyle of Checkpoint Software on Mitigation Strategies How are cybercrime syndicates launching attacks that leverage IoT devices? Eddie Doyle of Check Point Software Technologies offers insights on the latest attack strategies and how to counter them

IoT 181

Insight Partners' Latest Purchase: IoT Security Firm Armis

Data Breach Today

Private Equity Firm Expects to Close Deal in February Private equity firm Insight Partners plans to acquire yet another security company: This time it's IoT security startup Armis.

IoT 141

IoT Security Regulation is on the Horizon


Featured Government IoT CA senate bill 327 infosecurity 2019 IoT security IoT security code of conduct iot security improvement act of 2017 ken munro Lenox smart watch my friend Cayla NIST regulation

IoT 113

The Role of 'Prosilience' in IoT Security

Data Breach Today

The latest edition of the ISMG Security Report features a discussion of the role of "prosilience" in IoT security, plus the problem of overnotification under GDPR and the notion of "Spartacus as a Service

IoT 193

Extinguishing the IoT Insecurity Dumpster Fire


Or will legislation - such as the recent UK mandate announced this week - help boost IoT security? IoT Podcasts Privacy DDoS attack IoT security iot security solution P2P PKI uk iot regulation US IoT BillWill connected devices be insecure forever?

IoT 84

Actionable Threat Intel in the IoT Era

Data Breach Today

Vishak Raman of Cisco on Coping With the Expanding Attack Surface The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface.

IoT 194

2 Million IoT Devices Have P2P Software Flaw: Researcher

Data Breach Today

Vulnerabilities Found in Security Cameras, Baby Monitors and More An independent security researcher is warning about a vulnerability in peer-to-peer software used in millions of IoT devices that could allow a hacker to eavesdrop on conversations or turn these items into a botnet

IoT 249

Top 10 IoT Disasters of 2019


From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children's connected toys, here are the top IoT disasters in 2019.

IoT 82

Future-Proofing for IoT Risks

Data Breach Today

Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them Check Point's Robert Falzon on Preparing for the Changes to Come The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face.

IoT 169

5G and IoT: How to Approach the Security Implications


Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).

IoT 107

IoT Company Wyze Leaks Emails, Device Data of 2.4M


IoT Web Security data leak elasticsearch database iot data leaky database wyzeThe Internet of Things vendor confirmed that customer data was left unsecured on an Elasticsearch database.

IoT 83

Study: IoT Devices Have Alarmingly Weak RSA Keys

Data Breach Today

Weakness Lies in Devices Without Quality Entropy Sources IoT devices are generating duplicate prime numbers while generating RSA keys, putting them at risk of a factoring attack, according to new research, which shows such an attack could be done at scale and at a low computing cost

IoT 151

Managing IoT Risks: Reinventing Security

Data Breach Today

Security needs to be reinvented for the internet of things, and start-up companies can play a critical role, says Robin Saxby, the former CEO and founder of Arm Holdings, a U.K.-based based semiconductor company, who now invests in start-up firms

IoT 155

Cataloging IoT Vulnerabilities

Schneier on Security

Recent articles about IoT vulnerabilities describe hacking of construction cranes , supermarket freezers , and electric scooters. hacking internetofthings vulnerabilities

IoT 89

Gucci IOT Bot Discovered Targeting European Region

Security Affairs

Security Labs discovered a new IOT bot named “GUCCI”. It seems like the IOT botnet is named after an Italian luxury brand of fashion and leather goods. The IOT threat detection engine picked the infection IP has shown below hosting number of bins for different architectures.

IoT 102

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack


IoT Vulnerabilities 1 million devices Cyberattacks imperial dabman iot radio telnet backdoor vulnerability Vulnerability Lab weak passwordAttackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.

IoT 114

Half a Million IoT Device Passwords Published

Schneier on Security

It's a list of easy-to-guess passwords for IoT devices on the Internet as recently as last October and November.

ENFUSE 2019: Security Regulations, Insider Threats, and IoT Privacy Risks


Hacks IoT Podcasts efuse 2019 Incident response insider threat IoT security spearphishing threatThreatpost sits down with incident response expert Kevin Golas to discuss the top takeaways of ENFUSE 2019 this week.

IoT 97

Hacker Leaks More Than 500K Telnet Credentials for IoT Devices


Breach IoT Web Security botnet Credentials CyCognito data breach data leak DDoS DDoS attacks hacker IoT security Password Security TelnetBad actor obtained passwords for servers, home routers, and smart devices by scanning internet for devices open to the Telnet port.

IoT 64

A hacker has taken over at least 29 IoT botnets

Security Affairs

Hacker “Subby” brute-forces the backends of 29 IoT botnets that were using weak or default credentials. A hacker that goes online with the moniker ‘Subby’ took over 29 IoT botnets in the past few week s with brute-force attacks.

IoT 114

D-Link Settles With FTC Over Alleged IoT Security Failures

Data Breach Today

Federal Trade Commission, which alleged the IoT device developer left consumers vulnerable to hackers through inadequate security practices. The terms of the settlement may serve as a warning to IoT makers to get their security checks in order Proposed Settlement Requires D-Link to Bolster Security Program D-Link has reached a proposed settlement with the U.S.

IoT 162

Thousands of IoT Devices Bricked By Silex Malware


IoT Malware Newsmaker Interviews Podcasts brick iot BrickerBot DDoS hacker Internet of things IoT security malware Mirai silexA 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week.

IoT 114

Experts Bemoan Shortcomings with IoT Security Bill


The infosec community say a recently approved IoT security bill is "nice," but doesn't hit on the important issues. IoT Vulnerabilities California Connected devices DDoS iot bill iot law iot password IoT security SB-327

IoT 81

Consumers Urged to Junk Insecure IoT Devices


A security researcher who disclosed flaws impacting 2 million IoT devices in April - and has yet to see a patch or even hear back from the manufacturers contacted - is sounding off on the dire state of IoT security.

IoT 114

Attacks Targeting IoT Devices and Windows SMB Surge

Data Breach Today

IoT 260

RSA Conference 2019: Firms Continue to Fail at IoT Security


IoT is growing more popular in the home - and so too are the attacks that target these devices featuring valuable data, researchers said at RSA 2019. Hacks IoT Videos AEG smart scale iot hack IoT security Smart Home smart scale

IoT 103

Congress Considers IoT Cybersecurity Legislation - Again

Data Breach Today

Third Attempt at Setting Minimum Standards for Devices Government Uses The U.S.

IoT 222

Securing IoT: Is It Feasible?

Data Breach Today

consumers now own about 870 million IoT devices. In an interview, Al Pascual of Javelin Strategy & Research, discusses the challenges involved in securing the exploding IoT landscape

IoT 100

Exclusive: MalwareMustDie analyzes a new IoT malware dubbed Linux/ AirDropBot

Security Affairs

After 2 years of waiting, MalwareMustDie returns with an excellent page of malware analysis of a new IoT malware: Linux/AirDropBot. The beginning of the story: another IoT malware in the wild? Coming to the core topic: IoT botnet threat and their ecosystem.

IoT 109

Bot list with Telnet credentials for more than 500,000 servers and IoT devices leaked online

Security Affairs

The availability online of a new collection of Telnet credentials for more than 500,000 servers, routers, and IoT devices made the headlines. In August 2017, security researchers Ankit Anubhav found a list of more than 1,700 valid Telnet credentials for IoT devices online.

IoT 74

What BYOD can teach us about dealing with shadow IoT

OpenText Information Management

In its place, another security risk is coming to the fore: shadow IoT. Research shows that shadow IoT is … The post What BYOD can teach us about dealing with shadow IoT appeared first on OpenText Blogs.

IoT 56

Lousy IoT Security

Schneier on Security

DTEN makes smart screens and whiteboards for videoconferencing systems. Forescout found that their security is terrible: In total, our researchers discovered five vulnerabilities of four different kinds: Data exposure: PDF files of shared whiteboards (e.g.

IoT 68

Podcast: Why Manufacturers Struggle To Secure IoT


Too often, many IoT device manufacturers are opting to leave out costly security features for their small, low power connected devices. . IoT Podcasts DDoS IoT IoT Consumer Device IoT Device IoT security Threatpost podcast

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked

Security Affairs

A security researcher disclosed zero-day flaws in Telestar Digital GmbH IoT radio devices that could be exploited by remote attackers to hijack systems without any user interaction. SecurityAffairs – IoT radio devices, hacking). .

IoT 109