How IoT Changes Security

Data Breach Today

Steve Rog of ForeScout Technologies on Improving Security Hygiene The growth of IoT means traditional methods of security are inadequate, says Steve Rog of ForeScout Technologies, who calls for improvements in security hygiene

IoT 208

Countering Attacks That Leverage IoT

Data Breach Today

Eddie Doyle of Checkpoint Software on Mitigation Strategies How are cybercrime syndicates launching attacks that leverage IoT devices? Eddie Doyle of Check Point Software Technologies offers insights on the latest attack strategies and how to counter them

IoT 164

2019 IoT Security Outlook

Data Breach Today

DigiCert just conducted a global study of how organizations across sectors are approaching IoT security. What are some of the best practices of the organizations that emphasize securing connected devices? Mike Nelson of DigiCert shares the findings

IoT 126

Future-Proofing for IoT Risks

Data Breach Today

Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them Check Point's Robert Falzon on Preparing for the Changes to Come The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face.

IoT 152

Securing IoT: Is It Feasible?

Data Breach Today

consumers now own about 870 million IoT devices. In an interview, Al Pascual of Javelin Strategy & Research, discusses the challenges involved in securing the exploding IoT landscape

IoT 100

Experts Bemoan Shortcomings with IoT Security Bill

Threatpost

The infosec community say a recently approved IoT security bill is "nice," but doesn't hit on the important issues. IoT Vulnerabilities California Connected devices DDoS iot bill iot law iot password IoT security SB-327

IoT 65

At CES, Focus is On ‘Cool Factor’ Not IoT Security

Threatpost

When it comes to IoT, the priority at CES is the "wow factor" - but not so much a focus on security. Featured IoT CES ces 2019 consumer electronics show IoT security

IoT 71

Podcast: Two Billion IoT Devices Still Vulnerable to BlueBorne Bug

Threatpost

Up to two billion devices are still vulnerable to the BlueBorne IoT attack - and may not ever get a patch. IoT Malware blueborne Bluetooth iot attack IoT security

IoT 76

AWS FreeRTOS Bugs Allow Compromise of IoT Devices

Threatpost

The bugs let hackers crash IoT devices, leak their information, and completely take them over. IoT Vulnerabilities amazon AWS FreeRTOS IoT security vulnerabilities

IoT 84

Yet Another IoT Cybersecurity Document

Schneier on Security

This one is from NIST: " Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks." It's still in draft. Remember, there are many others. cybersecurity internetofthings nist

IoT Devices: Reducing the Risks

Data Breach Today

Attorney Steven Teppler, who recently wrote a report that addresses risks related to the internet of things, offers insights on risk management steps organizations in all sectors must take as IoT devices proliferate in the enterprise

IoT 112

Podcast: Why Manufacturers Struggle To Secure IoT

Threatpost

Too often, many IoT device manufacturers are opting to leave out costly security features for their small, low power connected devices. . IoT Podcasts DDoS IoT IoT Consumer Device IoT Device IoT security Threatpost podcast

IoT 59

Crypto Agility: Its Importance to IoT

Data Breach Today

Ted Shorter of CSS on the Need to Update Cryptographic Keys What is crypto agility, and why is it so important to IoT? Ted Shorter of Certified Security Solutions offers an explanation

IoT 130

When It Comes To IoT Security, Liability Is Muddled

Threatpost

The onus behind IoT security has become so muddled that no one knows who to point fingers at. IoT Vulnerabilities hacked IoT device IoT Act IoT botnet IoT security Security of things

IoT 61

Augmented Reality, IoT and Enterprise Content Management

OpenText Information Management

Augmented … The post Augmented Reality, IoT and Enterprise Content Management appeared first on OpenText Blogs. Cloud Enterprise Content Management augmented reality Big Data connected factory Extended ECM hololens IoT OpenText™ Extended ECM for Office 365

IoT 78

New DigiCert poll shows companies taking monetary hits due to IoT-related security missteps

The Last Watchdog

Even as enterprises across the globe hustle to get their Internet of Things business models up and running, there is a sense of foreboding about a rising wave of IoT-related security exposures. And, in fact, IoT-related security incidents have already begun taking a toll at ill-prepared companies. Related: How to hire an IoT botnet — for $20. That’s the upshot of an extensive survey commissioned by global TLS, PKI and IoT security solutions leader DigiCert.

IoT 138

ThreatList: Malware Samples Targeting IoT More Than Double in 2018

Threatpost

A honeypot set up to sniff out data on infected IoT devices found a broad array of compromised devices – from Mikrotik routers to dishwashers. IoT Malware botnet Gafgyt IoT security malware mikrotek Mirai SSH Telnet

Improving IoT Security

Data Breach Today

Organizations in all sectors need to strive to adopt a standardized approach for ensuring that security is built into internet of things devices at the design phase, says Vinod Kumar, CEO and managing director at Bangalore-based Subex, a telecom analytics solutions provider

IoT 109

5 IoT Security Predictions for 2019

Security Affairs

2018 was the year of the Internet of Things (IoT), massive attacks and various botnets hit smart devices, These are 5 IoT Security Predictions for 2019. 2018 was the year of the Internet of Things (IoT) – massive attacks and various botnets, a leap in regulation and standards, and increased adoption of IoT devices by consumers and enterprises, despite the existence of security and privacy concerns. IoT Attacks in 2018. Three IoT Attack Avenues for 2019.

IoT 71

IoT Security: The Basics

Pwnie Express

This piece is part 1 of our ongoing series on IoT security. Don't forget to download the eBook to understand the IoT security gap and how your business needs to address it, today. IoT Security

eBook 46

Electric Vehicle Charging Stations Open to IoT Attacks

Threatpost

IoT Vulnerabilities chargepoint home charging station electric vehicle physical damage security flaws vulnerabilities wireless accessFlaws could allow an attacker to stop or start a home charging station, or even change the current in order to start a fire.

IoT 83

Hacking the Twinkly IoT Christmas lights

Security Affairs

Security researchers discovered some flaws in the Twinkly IoT lights that could be exploited display custom lighting effects and to remotely turn off them. The post Hacking the Twinkly IoT Christmas lights appeared first on Security Affairs.

IoT 78

IoT Inspector Tool from Princeton

Schneier on Security

Researchers at Princeton University have released IoT Inspector , a tool that analyzes the security and privacy of IoT devices by examining the data they send across the Internet. They've already used the tool to study a bunch of different IoT devices. Related: IoT Hall of Shame.

IoT 83

Podcast: IoT Firms Face a ‘Tidal Wave’ of Lawsuits, Attorney Explains

Threatpost

An attorney in the infamous 2015 Jeep hack predicts that more lawsuits related to IoT security are looming in the future. IoT Podcasts 3G iot legal issue IoT security jeep hack

IoT 59

IoT: Moving to Security by Design

Data Breach Today

With the explosive growth of the internet of things, and the increasing threat posed by botnets that leverage IoT, more must be done to ensure IoT devices include security by design, says David Holmes, principal threat researcher at F5 Networks, who offers a strategy

IoT 103

Alleged ‘Satori’ IoT Botnet Operator Sought Media Spotlight, Got Indicted

Krebs on Security

Satori is a variant of the Mirai botnet , a powerful IoT malware strain that first came online in July 2016.

IoT 147

Yi IoT Home Camera Riddled with Code-Execution Vulnerabilities

Threatpost

Five of them allow remote compromise of the IoT gadgets, so attackers can intercept video feeds and more. Cloud Security IoT Vulnerabilities Cisco Denial of Service Internet of things remote code execution Talos video feed interception vulnerabilities yi camera

IoT 77

Security Glitch in IoT Camera Enabled Remote Monitoring

Threatpost

After researchers found a security glitch that let them hack into an IoT camera, the manufacturer of the camera has fixed the issue. IoT Privacy hacked camera IoT camera IoT security Ozvision Swann camera

IoT 59

IoT Flaw Allows Hijacking of Connected Construction Cranes

Threatpost

Critical Infrastructure IoT Vulnerabilities connected things construction crane CVE-2018-17935 f25 hijacking spoofed commands telecrane vulnerabilityAn attacker can send spoofed commands to the crane's controller.

IoT 80

The IoT Hype Cycle

Information Matters

The IoT Hype Cycle. We know that last year Gartner placed the IoT at the Peak of Inflated Expectations on its annual hype cycle chart. Several observations: the search term “IoT” seems to have taken over from “Internet of Things” for general web searches.

IoT 52

As Black Friday Looms, IoT Gadgets Take the Risk Spotlight

Threatpost

Ahead of the holiday shopping bonanza, the security community is talking to consumers about IoT security. Hacks IoT Vulnerabilities Web Security black friday buggle baby connected gadgets holiday shopping Mozilla pentest partners privacy not included qvc spoof rankings risk Security security community

IoT 77

IoT Robot Vacuum Vulnerabilities Let Hackers Spy on Victims

Threatpost

IoT Vulnerabilities Web Security CVE-2018-10987 IoT security Vacuum vulnerabilityTwo vulnerabilities were discovered on Dongguan Diqee-branded vacuum cleaners, Thursday.

IoT 63

Hidden Costs of IoT Vulnerabilities

Dark Reading

IoT devices have become part of our work and personal lives. Unfortunately, building security into these devices was largely an afterthought

IoT 70

Public Hearing on IoT Risks

Schneier on Security

The US Consumer Product Safety Commission is holding hearings on IoT risks: The U.S.

IoT 82

Black Hat Exclusive Video: The IoT Security Threat Looms for Enterprises

Threatpost

Armis' CTO discusses the top IoT security issues in the marketplace today - and whether device manufacturers will start to prioritize security. Black Hat IoT Videos Armis DDoS attack DEF CON IoT security

Video 78

The UK IoT Jobs Sector

Information Matters

It is a snapshot of vacant IoT positions across a range of employers. The report concludes with some thoughts on the strengths and weaknesses of the emerging UK IoT sector: Strengths. The post The UK IoT Jobs Sector appeared first on Information Matters. DOWNLOAD REPORT.

IoT 52

FreeRTOS flaws expose millions of IoT devices to cyber attacks

Security Affairs

The researcher Ori Karliner and his team analyzed some of the most popular operating systems in the IoT market, including the FreeRTOS. FreeRTOS is an open-source operating system that runs on most of the small microprocessors and microcontrollers in IoT devices.

IoT 97

7 Serious IoT Vulnerabilities

Dark Reading

A growing number of employees have various IoT devices in their homes - where they're also connecting to an enterprise network to do their work. And that means significant threats loom

IoT 70

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The Last Watchdog

In 2019, and moving ahead, look for legacy IT business networks to increasingly intersect with a new class of networks dedicated to controlling the operations of a IoT-enabled services of all types, including smart buildings, IoT-enabled healthcare services and driverless cars. New vulnerabilities and exposures are part and parcel of accelerating the deployment of vast distributed systems, fed by billions of IoT sensors.

IoT 133

Who is Responsible for IoT Security?

Pwnie Express

This piece is part 4 of our ongoing series on IoT security. Don't forget to download the ebook to understand the IoT security gap and how your business needs to address it, today. IoT Security

eBook 51