Analysis: Keeping IoT Devices Secure

Data Breach Today

This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity

IoT 169

New Charges, Sentencing in Satori IoT Botnet Conspiracy

Krebs on Security

Justice Department today criminally charged a Canadian and a Northern Ireland man for allegedly conspiring to build botnets that enslaved hundreds of thousands of routers and other Internet of Things (IoT) devices for use in large-scale distributed denial-of-service (DDoS) attacks. The U.S.

IoT 191

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Survey: Security Concerns Slow Down IoT Deployments

Data Breach Today

Preventing Ransomware and Other Malware Attacks Is Top of Mind for Enterprises Worries over ransomware and malware are slowing down enterprise IoT deployments, which is a reflection of the reputational and customer relationship risks at stake, according to a new survey.

IoT 196

How Amazon and Walmart Could Fix IoT Security

Data Breach Today

Bruce Schneier Says Pressure on Retailers Could Fix Insecure IoT Supply Chains IoT devices can be made cheaply and quickly. But as a result, they may lack adequate security features.

IoT 159

Japan's IoT Scanning Project: Insecure Devices Found

Data Breach Today

The results are encouraging, and the country's program could serve as a model for other nations aiming to avoid large-scale IoT security problems

IoT 148

Coming Soon: 'Trust Mark' Certification for IoT Devices

Data Breach Today

Program, Which Could Become Global, Designed to Evaluate Security of Connected Devices An Australian IoT alliance is developing a certification program designed to raise security standards for connected device manufacturers and give consumers more confidence that they're buying secure devices.

IoT 208

How IoT Changes Security

Data Breach Today

Steve Rog of ForeScout Technologies on Improving Security Hygiene The growth of IoT means traditional methods of security are inadequate, says Steve Rog of ForeScout Technologies, who calls for improvements in security hygiene

IoT 208

New Malware Family Assembles IoT Botnet

Dark Reading

Mozi' combines code from three previously known IoT malware

IoT 104

Analyzing IoT Security Best Practices

Schneier on Security

New research: " Best Practices for IoT Security: What Does That Even Mean? " We consider categories of best practices, and how they apply over the lifecycle of IoT devices. by Christopher Bellman and Paul C.

IoT 87

Fixing IoT Leaks with Hardware Security

Data Breach Today

Brian Romansky of Owl Cyber Defense Discusses the Role of Data Diodes Data diodes provide a way to control data flows in IoT devices, says Brian Romansky of Owl Cyber Defense, who describes "unhackable" hardware

IoT 197

2019 IoT Security Outlook

Data Breach Today

DigiCert just conducted a global study of how organizations across sectors are approaching IoT security. What are some of the best practices of the organizations that emphasize securing connected devices? Mike Nelson of DigiCert shares the findings

IoT 151

More Than Half of IoT Devices Vulnerable to Severe Attacks

Threatpost

A full 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network.

IoT 108

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders. If the code stamped on your IoT device begins with one of these, it is vulnerable.

IoT 245

Social Distancing for Healthcare's IoT Devices

Dark Reading

Security pros need to double down around prevention of lateral movement by attackers, especially if IoT devices are connected to the network

IoT 101

IoT Privacy and Security: Will Product Labels Help Buyers?

Data Breach Today

Food-Like Labeling for Connected Devices Developed by Carnegie Mellon University With internet connectivity getting added to an increasing number of products, privacy and security risks abound. But buyers may be unaware.

IoT 239

Countering Attacks That Leverage IoT

Data Breach Today

Eddie Doyle of Checkpoint Software on Mitigation Strategies How are cybercrime syndicates launching attacks that leverage IoT devices? Eddie Doyle of Check Point Software Technologies offers insights on the latest attack strategies and how to counter them

IoT 169

The Role of 'Prosilience' in IoT Security

Data Breach Today

The latest edition of the ISMG Security Report features a discussion of the role of "prosilience" in IoT security, plus the problem of overnotification under GDPR and the notion of "Spartacus as a Service

IoT 192

What’s new in OpenText IoT 20.2

OpenText Information Management

70% of enterprises are using IoT data to improve the … The post What’s new in OpenText IoT 20.2 Business Network IoT Supply Chain Visibility digital transformation OpenText Business Network OpenText IoT 20.2

IoT 60

IoT Security Woes Plague Healthcare Industry

Threatpost

Hospitals and IoT device manufacturers must take a dual approach in securing connected telehealth devices. IoT Vulnerabilities Connected devices Cybersecurity enfuse 2019 Healthcare Internet of things iot medical IoT regulation Medical device security regulation SB-327

IoT 90

‘Satori’ IoT Botnet Operator Pleads Guilty

Krebs on Security

Satori was originally based on the leaked source code for Mirai , a powerful IoT botnet that first appeared in the summer of 2016 and was responsible for some of the largest denial-of-service attacks ever recorded (including a 620 Gbps attack that took KrebsOnSecurity offline for almost four days ).

IoT 181

26 IoT Flaws Enable Denial-of-Service Attacks, Privilege Escalation

Dark Reading

Research details vulnerabilities in the Zephyr Real Time Operating Systems and MCUboot, both used in IoT devices and sensors

IoT 101

IoT Security Regulation is on the Horizon

Threatpost

Featured Government IoT CA senate bill 327 infosecurity 2019 IoT security IoT security code of conduct iot security improvement act of 2017 ken munro Lenox smart watch my friend Cayla NIST regulation

IoT 103

2 Million IoT Devices Have P2P Software Flaw: Researcher

Data Breach Today

Vulnerabilities Found in Security Cameras, Baby Monitors and More An independent security researcher is warning about a vulnerability in peer-to-peer software used in millions of IoT devices that could allow a hacker to eavesdrop on conversations or turn these items into a botnet

IoT 245

IoT Security: 20 Years Behind Enterprise Computing

Data Breach Today

While IoT devices are entering enterprises at a rapid pace, the security practices around them are as much as 20 years behind those for enterprise computing, says Sean Peasley of Deloitte, who outlines steps organizations can take to ensure safe IoT computing

IoT 130

Actionable Threat Intel in the IoT Era

Data Breach Today

Vishak Raman of Cisco on Coping With the Expanding Attack Surface The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface.

IoT 183

Zxyel Flaw Powers New Mirai IoT Botnet Strain

Krebs on Security

This week, security researchers said they spotted that same vulnerability being exploited by a new variant of Mirai , a malware strain that targets vulnerable Internet of Things (IoT) devices for use in large-scale attacks and as proxies for other cybercrime activity.

IoT 181

Microsoft Shells Out $100K for IoT Security

Threatpost

A three-month Azure Sphere bug-bounty challenge will offer top rewards for compromising Pluton or Secure World within Microsoft's IoT security suite. Bug Bounty IoT Vulnerabilities Webinars $100 000 azure sphere bug bounty Internet of things Microsoft pluton secure world security challenge

IoT 93

Future-Proofing for IoT Risks

Data Breach Today

Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them Check Point's Robert Falzon on Preparing for the Changes to Come The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face.

IoT 157

Securing the International IoT Supply Chain

Schneier on Security

Together with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. The basic problem we try to solve is: how to you enforce IoT security regulations when most of the stuff is made in other countries?

IoT 72

7 Steps to IoT Security in 2020

Dark Reading

There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020

IoT 106

IoT in Petro-Chem

RFID Global Solution, Inc.

The Chemical and Petroleum industries provide challenging environments for the design and implementation of IoT solutions. A solution suitable for the petrochem industry differs from solutions for other industrial sectors due to hazardous locations requiring specially designed and … IoT in Petro-Chem Read More ». The post IoT in Petro-Chem appeared first on RFID Global Solution. Blog IoT IoT oil and gas

IoT 40

Mandatory IoT Security in the Offing with U.K. Proposal

Threatpost

Government IoT default password Device security Internet of things iot legislation iot manufacturers IoT security Password regulation Security Updates tech law Uk gov law uk lawThe new U.K.

IoT 85

New Kaiji Botnet Targets IoT, Linux Devices

Threatpost

IoT Malware botnet brute force DDoS attack go language golang kaiji Linux Mirai SSHThe botnet uses SSH brute-force attacks to infect devices and uses a custom implant written in the Go Language.

IoT 91

New Linux Worm Attacks IoT Devices

Dark Reading

Silex has 'bricked' more than 2,000 Linux-based IoT devices so far

IoT 113

Extinguishing the IoT Insecurity Dumpster Fire

Threatpost

Or will legislation - such as the recent UK mandate announced this week - help boost IoT security? IoT Podcasts Privacy DDoS attack IoT security iot security solution P2P PKI uk iot regulation US IoT BillWill connected devices be insecure forever?

IoT 70

UpNp Vulnerability Could Affect Billions of IoT Devices

Data Breach Today

CalllStranger Flaw Found in Windows 10, Other Connected Devices Carnegie Mellon University Software Engineering Institute's CERT notification center has posted a warning of a flaw in the Universal Plug and Play protocol that could potentially affect billions of internet-connected devices.

IoT 169

NIST Issues IoT Risk Guidelines

Dark Reading

A new report offers the first step toward understanding and managing IoT cybersecurity risks

IoT 86

How to Assess More Sophisticated IoT Threats

Dark Reading

Securing the Internet of Things requires diligence in secure development and hardware design throughout the product life cycle, as well as resilience testing and system component analysis

IoT 79

Cataloging IoT Vulnerabilities

Schneier on Security

Recent articles about IoT vulnerabilities describe hacking of construction cranes , supermarket freezers , and electric scooters. hacking internetofthings vulnerabilities

IoT 81

Managing IoT Risks: Reinventing Security

Data Breach Today

Security needs to be reinvented for the internet of things, and start-up companies can play a critical role, says Robin Saxby, the former CEO and founder of Arm Holdings, a U.K.-based based semiconductor company, who now invests in start-up firms

IoT 146