How IoT Changes Security

Data Breach Today

Steve Rog of ForeScout Technologies on Improving Security Hygiene The growth of IoT means traditional methods of security are inadequate, says Steve Rog of ForeScout Technologies, who calls for improvements in security hygiene

IoT 208

‘Satori’ IoT Botnet Operator Pleads Guilty

Krebs on Security

Satori was originally based on the leaked source code for Mirai , a powerful IoT botnet that first appeared in the summer of 2016 and was responsible for some of the largest denial-of-service attacks ever recorded (including a 620 Gbps attack that took KrebsOnSecurity offline for almost four days ).

IoT 267

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders. If the code stamped on your IoT device begins with one of these, it is vulnerable.

IoT 285

Fixing IoT Leaks with Hardware Security

Data Breach Today

Brian Romansky of Owl Cyber Defense Discusses the Role of Data Diodes Data diodes provide a way to control data flows in IoT devices, says Brian Romansky of Owl Cyber Defense, who describes "unhackable" hardware

IoT 205

IoT Security Woes Plague Healthcare Industry

Threatpost

Hospitals and IoT device manufacturers must take a dual approach in securing connected telehealth devices. IoT Vulnerabilities Connected devices Cybersecurity enfuse 2019 Healthcare Internet of things iot medical IoT regulation Medical device security regulation SB-327

IoT 109

2019 IoT Security Outlook

Data Breach Today

DigiCert just conducted a global study of how organizations across sectors are approaching IoT security. What are some of the best practices of the organizations that emphasize securing connected devices? Mike Nelson of DigiCert shares the findings

IoT 160

Countering Attacks That Leverage IoT

Data Breach Today

Eddie Doyle of Checkpoint Software on Mitigation Strategies How are cybercrime syndicates launching attacks that leverage IoT devices? Eddie Doyle of Check Point Software Technologies offers insights on the latest attack strategies and how to counter them

IoT 181

IoT Security: 20 Years Behind Enterprise Computing

Data Breach Today

While IoT devices are entering enterprises at a rapid pace, the security practices around them are as much as 20 years behind those for enterprise computing, says Sean Peasley of Deloitte, who outlines steps organizations can take to ensure safe IoT computing

IoT 139

IoT Security Regulation is on the Horizon

Threatpost

Featured Government IoT CA senate bill 327 infosecurity 2019 IoT security IoT security code of conduct iot security improvement act of 2017 ken munro Lenox smart watch my friend Cayla NIST regulation

IoT 113

The Role of 'Prosilience' in IoT Security

Data Breach Today

The latest edition of the ISMG Security Report features a discussion of the role of "prosilience" in IoT security, plus the problem of overnotification under GDPR and the notion of "Spartacus as a Service

IoT 193

More Than Half of IoT Devices Vulnerable to Severe Attacks

Threatpost

A full 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network.

IoT 72

Extinguishing the IoT Insecurity Dumpster Fire

Threatpost

Or will legislation - such as the recent UK mandate announced this week - help boost IoT security? IoT Podcasts Privacy DDoS attack IoT security iot security solution P2P PKI uk iot regulation US IoT BillWill connected devices be insecure forever?

IoT 84

Actionable Threat Intel in the IoT Era

Data Breach Today

Vishak Raman of Cisco on Coping With the Expanding Attack Surface The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface.

IoT 194

IoT in Petro-Chem

RFID Global Solution, Inc.

The Chemical and Petroleum industries provide challenging environments for the design and implementation of IoT solutions. A solution suitable for the petrochem industry differs from solutions for other industrial sectors due to hazardous locations requiring specially designed and … IoT in Petro-Chem Read More ». The post IoT in Petro-Chem appeared first on RFID Global Solution. Blog IoT IoT oil and gas

IoT 40

Cataloging IoT Vulnerabilities

Schneier on Security

Recent articles about IoT vulnerabilities describe hacking of construction cranes , supermarket freezers , and electric scooters. hacking internetofthings vulnerabilities

IoT 99

2 Million IoT Devices Have P2P Software Flaw: Researcher

Data Breach Today

Vulnerabilities Found in Security Cameras, Baby Monitors and More An independent security researcher is warning about a vulnerability in peer-to-peer software used in millions of IoT devices that could allow a hacker to eavesdrop on conversations or turn these items into a botnet

IoT 249

Future-Proofing for IoT Risks

Data Breach Today

Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them Check Point's Robert Falzon on Preparing for the Changes to Come The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face.

IoT 169

5G and IoT: How to Approach the Security Implications

Threatpost

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).

IoT 109

New Linux Worm Attacks IoT Devices

Dark Reading

Silex has 'bricked' more than 2,000 Linux-based IoT devices so far

IoT 114

Managing IoT Risks: Reinventing Security

Data Breach Today

Security needs to be reinvented for the internet of things, and start-up companies can play a critical role, says Robin Saxby, the former CEO and founder of Arm Holdings, a U.K.-based based semiconductor company, who now invests in start-up firms

IoT 155

Insight Partners' Latest Purchase: IoT Security Firm Armis

Data Breach Today

Private Equity Firm Expects to Close Deal in February Private equity firm Insight Partners plans to acquire yet another security company: This time it's IoT security startup Armis.

IoT 141

NIST Issues IoT Risk Guidelines

Dark Reading

A new report offers the first step toward understanding and managing IoT cybersecurity risks

IoT 87

Japan Authorizes IoT Hacking

Dark Reading

A new campaign will see government employees hacking into personal IoT devices to identify those at highest security risk

IoT 87

UK Government Proposes IoT Security Measures

Data Breach Today

Rules Would Strengthen Password Protection and Vulnerability Reporting With the number of installed internet of things devices expected to surpass 75 billion by 2025, the U.K.

IoT 153

Top 10 IoT Disasters of 2019

Threatpost

From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children's connected toys, here are the top IoT disasters in 2019.

IoT 82

The need for rock-solid, reliable IoT Middleware

RFID Global Solution, Inc.

With the explosive growth in the use of RFID tags and IoT sensors, having a rock-solid, reliable middleware system to process incoming sensor and tag reads is becoming increasingly important. The post The need for rock-solid, reliable IoT Middleware appeared first on RFID Global Solution.

IoT 52

A hacker has taken over at least 29 IoT botnets

Security Affairs

Hacker “Subby” brute-forces the backends of 29 IoT botnets that were using weak or default credentials. A hacker that goes online with the moniker ‘Subby’ took over 29 IoT botnets in the past few week s with brute-force attacks.

IoT 114

Experts Bemoan Shortcomings with IoT Security Bill

Threatpost

The infosec community say a recently approved IoT security bill is "nice," but doesn't hit on the important issues. IoT Vulnerabilities California Connected devices DDoS iot bill iot law iot password IoT security SB-327

IoT 80

Study: IoT Devices Have Alarmingly Weak RSA Keys

Data Breach Today

Weakness Lies in Devices Without Quality Entropy Sources IoT devices are generating duplicate prime numbers while generating RSA keys, putting them at risk of a factoring attack, according to new research, which shows such an attack could be done at scale and at a low computing cost

IoT 151

Mandatory IoT Security in the Offing with U.K. Proposal

Threatpost

Government IoT default password Device security Internet of things iot legislation iot manufacturers IoT security Password regulation Security Updates tech law Uk gov law uk lawThe new U.K.

IoT 71

D-Link Settles With FTC Over Alleged IoT Security Failures

Data Breach Today

Federal Trade Commission, which alleged the IoT device developer left consumers vulnerable to hackers through inadequate security practices. The terms of the settlement may serve as a warning to IoT makers to get their security checks in order Proposed Settlement Requires D-Link to Bolster Security Program D-Link has reached a proposed settlement with the U.S.

IoT 162

RSA Conference 2019: Firms Continue to Fail at IoT Security

Threatpost

IoT is growing more popular in the home - and so too are the attacks that target these devices featuring valuable data, researchers said at RSA 2019. Hacks IoT Videos AEG smart scale iot hack IoT security Smart Home smart scale

IoT 105

Thousands of IoT Devices Bricked By Silex Malware

Threatpost

IoT Malware Newsmaker Interviews Podcasts brick iot BrickerBot DDoS hacker Internet of things IoT security malware Mirai silexA 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week.

IoT 114

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack

Threatpost

IoT Vulnerabilities 1 million devices Cyberattacks imperial dabman iot radio telnet backdoor vulnerability Vulnerability Lab weak passwordAttackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.

IoT 114

Gucci IOT Bot Discovered Targeting European Region

Security Affairs

Security Labs discovered a new IOT bot named “GUCCI”. It seems like the IOT botnet is named after an Italian luxury brand of fashion and leather goods. The IOT threat detection engine picked the infection IP has shown below hosting number of bins for different architectures.

IoT 96

Securing IoT: Is It Feasible?

Data Breach Today

consumers now own about 870 million IoT devices. In an interview, Al Pascual of Javelin Strategy & Research, discusses the challenges involved in securing the exploding IoT landscape

IoT 100

Consumers Urged to Junk Insecure IoT Devices

Threatpost

A security researcher who disclosed flaws impacting 2 million IoT devices in April - and has yet to see a patch or even hear back from the manufacturers contacted - is sounding off on the dire state of IoT security.

IoT 113

Congress Considers IoT Cybersecurity Legislation - Again

Data Breach Today

Third Attempt at Setting Minimum Standards for Devices Government Uses The U.S.

IoT 222

IoT Company Wyze Leaks Emails, Device Data of 2.4M

Threatpost

IoT Web Security data leak elasticsearch database iot data leaky database wyzeThe Internet of Things vendor confirmed that customer data was left unsecured on an Elasticsearch database.

IoT 83

Attacks Targeting IoT Devices and Windows SMB Surge

Data Breach Today

Researchers Say Mirai Derivatives and EternalBlue Exploits Pummel Internet-Connected Devices Two years after WannaCry wrecked havoc via flaws in SMB_v1 and three years after Mirai infected internet of things devices en masse via default credentials, attackers are increasingly targeting the same flaws, security experts warn.

IoT 260