Fixing IoT Leaks with Hardware Security

Data Breach Today

Brian Romansky of Owl Cyber Defense Discusses the Role of Data Diodes Data diodes provide a way to control data flows in IoT devices, says Brian Romansky of Owl Cyber Defense, who describes "unhackable" hardware

IoT 185

How IoT Changes Security

Data Breach Today

Steve Rog of ForeScout Technologies on Improving Security Hygiene The growth of IoT means traditional methods of security are inadequate, says Steve Rog of ForeScout Technologies, who calls for improvements in security hygiene

IoT 208

‘Satori’ IoT Botnet Operator Pleads Guilty

Krebs on Security

Satori was originally based on the leaked source code for Mirai , a powerful IoT botnet that first appeared in the summer of 2016 and was responsible for some of the largest denial-of-service attacks ever recorded (including a 620 Gbps attack that took KrebsOnSecurity offline for almost four days ).

IoT 171

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders. If the code stamped on your IoT device begins with one of these, it is vulnerable.

IoT 238

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack

Threatpost

IoT Vulnerabilities 1 million devices Cyberattacks imperial dabman iot radio telnet backdoor vulnerability Vulnerability Lab weak passwordAttackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.

IoT 114

IoT Security Regulation is on the Horizon

Threatpost

Featured Government IoT CA senate bill 327 infosecurity 2019 IoT security IoT security code of conduct iot security improvement act of 2017 ken munro Lenox smart watch my friend Cayla NIST regulation

IoT 109

Managing IoT Risks: Reinventing Security

Data Breach Today

Security needs to be reinvented for the internet of things, and start-up companies can play a critical role, says Robin Saxby, the former CEO and founder of Arm Holdings, a U.K.-based based semiconductor company, who now invests in start-up firms

IoT 137

The Role of 'Prosilience' in IoT Security

Data Breach Today

The latest edition of the ISMG Security Report features a discussion of the role of "prosilience" in IoT security, plus the problem of overnotification under GDPR and the notion of "Spartacus as a Service

IoT 187

Attacks Targeting IoT Devices and Windows SMB Surge

Data Breach Today

IoT 236

Countering Attacks That Leverage IoT

Data Breach Today

Eddie Doyle of Checkpoint Software on Mitigation Strategies How are cybercrime syndicates launching attacks that leverage IoT devices? Eddie Doyle of Check Point Software Technologies offers insights on the latest attack strategies and how to counter them

IoT 159

Extinguishing the IoT Insecurity Dumpster Fire

Threatpost

Or will legislation - such as the recent UK mandate announced this week - help boost IoT security? IoT Podcasts Privacy DDoS attack IoT security iot security solution P2P PKI uk iot regulation US IoT BillWill connected devices be insecure forever?

IoT 76

2 Million IoT Devices Have P2P Software Flaw: Researcher

Data Breach Today

Vulnerabilities Found in Security Cameras, Baby Monitors and More An independent security researcher is warning about a vulnerability in peer-to-peer software used in millions of IoT devices that could allow a hacker to eavesdrop on conversations or turn these items into a botnet

IoT 237

Thousands of IoT Devices Bricked By Silex Malware

Threatpost

IoT Malware Newsmaker Interviews Podcasts brick iot BrickerBot DDoS hacker Internet of things IoT security malware Mirai silexA 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week.

IoT 114

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked

Security Affairs

A security researcher disclosed zero-day flaws in Telestar Digital GmbH IoT radio devices that could be exploited by remote attackers to hijack systems without any user interaction. SecurityAffairs – IoT radio devices, hacking). .

IoT 96

Actionable Threat Intel in the IoT Era

Data Breach Today

Vishak Raman of Cisco on Coping With the Expanding Attack Surface The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface.

IoT 171

Consumers Urged to Junk Insecure IoT Devices

Threatpost

A security researcher who disclosed flaws impacting 2 million IoT devices in April - and has yet to see a patch or even hear back from the manufacturers contacted - is sounding off on the dire state of IoT security.

IoT 110

Future-Proofing for IoT Risks

Data Breach Today

Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them Check Point's Robert Falzon on Preparing for the Changes to Come The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face.

IoT 149

A hacker has taken over at least 29 IoT botnets

Security Affairs

Hacker “Subby” brute-forces the backends of 29 IoT botnets that were using weak or default credentials. A hacker that goes online with the moniker ‘Subby’ took over 29 IoT botnets in the past few week s with brute-force attacks.

IoT 106

D-Link Settles With FTC Over Alleged IoT Security Failures

Data Breach Today

Federal Trade Commission, which alleged the IoT device developer left consumers vulnerable to hackers through inadequate security practices. The terms of the settlement may serve as a warning to IoT makers to get their security checks in order Proposed Settlement Requires D-Link to Bolster Security Program D-Link has reached a proposed settlement with the U.S.

IoT 145

Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger

Threatpost

IoT Vulnerabilities API Bluetooth connected home Hickory Smart BlueTooth Enabled Deadbolt IoT security Privacy vulnerability

IoT 107

Cataloging IoT Vulnerabilities

Schneier on Security

Recent articles about IoT vulnerabilities describe hacking of construction cranes , supermarket freezers , and electric scooters. hacking internetofthings vulnerabilities

IoT 79

RSA Conference 2019: Firms Continue to Fail at IoT Security

Threatpost

IoT is growing more popular in the home - and so too are the attacks that target these devices featuring valuable data, researchers said at RSA 2019. Hacks IoT Videos AEG smart scale iot hack IoT security Smart Home smart scale

IoT 96

Securing IoT: Is It Feasible?

Data Breach Today

consumers now own about 870 million IoT devices. In an interview, Al Pascual of Javelin Strategy & Research, discusses the challenges involved in securing the exploding IoT landscape

IoT 100

News Wrap: IoT Radio Telnet Backdoor And ‘SimJacker’ Active Exploit

Threatpost

Hacks IoT Malware Podcasts backdoor data expose database elasticsearch server IoT security podcast sim simjacker TelnetThreatpost editors Tara Seals and Lindsey O'Donnell talk about the top news stories of the week - from leaky databases to SIM card attacks.

IoT 65

Congress Considers IoT Cybersecurity Legislation - Again

Data Breach Today

Third Attempt at Setting Minimum Standards for Devices Government Uses The U.S.

IoT 213

Experts Bemoan Shortcomings with IoT Security Bill

Threatpost

The infosec community say a recently approved IoT security bill is "nice," but doesn't hit on the important issues. IoT Vulnerabilities California Connected devices DDoS iot bill iot law iot password IoT security SB-327

IoT 70

MY TAKE: Can embedding security deep inside mobile apps point the way to securing IoT?

The Last Watchdog

Enterprises across the planet are revving up their IoT business models, and yet there is a sense of foreboding about a rising wave of IoT-related security exposures. IoT systems introduce added layers of network complexity, which translates into an enlarged attack surface.

IoT 168

New Linux Worm Attacks IoT Devices

Dark Reading

Silex has 'bricked' more than 2,000 Linux-based IoT devices so far

IoT 113

IoT Security Challenges in a 5G Era: Expert Advice

Threatpost

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar replay.

IoT 86

NIST Issues IoT Risk Guidelines

Dark Reading

A new report offers the first step toward understanding and managing IoT cybersecurity risks

Massive Botnet Attack Used More Than 400,000 IoT Devices

Data Breach Today

Researchers at Imperva Say Incident Mimicked Mirai-Style DDoS Attack A massive botnet attack earlier this year utilized more than 400,000 connected devices over the course of 13 days, according to researchers at the security firm Imperva

IoT 203

Japan’s government hacks citizens’ IoT devices

IT Governance

Earlier this year, the Japanese government launched a campaign in which it hacked into citizens’ IoT (Internet of Things) devices to see how secure the technology is. You can understand Japan’s eagerness to address IoT security. Cyber Security IOT

IoT 72

IoT Cybersecurity Bill Proposed to Congress

Adam Levin

Congress proposed a bill to improve the security of internet-enabled devices called the Internet of Things (IoT) Cybersecurity Improvement Act of 2019. The post IoT Cybersecurity Bill Proposed to Congress appeared first on Adam Levin.

IoT 75

New IoT Security Regulations

Schneier on Security

While the US government is largely absent in this area of consumer protection, the state of California has recently stepped in and started regulating the Internet of Things, or "IoT" devices sold in the state­and the effects will soon be felt worldwide.

IoT 97

ARES ADB IOT Botnet targets Android Set Top Boxes (STB) and TVs

Security Affairs

Researchers from WootCloud Labs have uncovered a new IoT botnet named Ares that is targeting Android-based devices. Experts from WootCloud Labs have spotted a new IoT botnet tracked as Ares that is targeting Android-based devices that have a debug port exposed online.

IoT 80

IoT and Quantum Computing’s Impact on the Federal Government

Thales eSecurity

Although one presentation was on IoT and the other was on quantum computing, they both had the same undertone and messaging. The Continued Impact of IoT. With IoT, this increases the attack vector exponentially.

IoT 82

Authenticating in the Age of IoT

Data Breach Today

Nok Nok Lab's Philip Dunkelberger on Why Traditional Authentication Won't Work With the advent of the internet of things, authentication needs to be far more scalable, says Phillip Dunkelberger, CEO of Nok Nok Labs

Hack of High-End Hotel Smart Locks Shows IoT Security Fail

Threatpost

LAS VEGAS – A vulnerability in a popular IoT lock key – used chiefly by a high-end hotel in Europe – allowed researchers to break into hotel rooms. Black Hat Hacks IoT

IoT 111

2 Million IoT Devices Vulnerable to Complete Takeover

Threatpost

IoT Privacy Vulnerabilities "smart" doorbells attack baby monitor iLnkP2P IoT security P2P security camera video stream takeover vulnerabilityMillions of security cameras, baby monitors and "smart" doorbells are open to hijack - and no solution is currently available.

IoT 87

Podcast: Two Billion IoT Devices Still Vulnerable to BlueBorne Bug

Threatpost

Up to two billion devices are still vulnerable to the BlueBorne IoT attack - and may not ever get a patch. IoT Malware blueborne Bluetooth iot attack IoT security

IoT 76