New Fido Protocol Simplifies IoT Device Onboarding

Data Breach Today

Standard Designed to Cut the Cost and Time to Securely Connect IoT Devices The Fido Alliance, an association that has developed voluntary authentication standards with a goal of minimizing the use of passwords, has launched an onboarding protocol for IoT devices that's designed to enhance security

IoT 161

New Online Platform Coordinates IoT Bug Reports

Data Breach Today

VulnerableThings.com Seeks to Improve Bug Reporting for Connected Devices A new online platform called VulnerableThings.com is aiming to become the go-to place for reporting and viewing reports on software flaws in IoT devices.

IoT 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Singapore Launches IoT Cybersecurity Labelling

Data Breach Today

Labels Will Indicate What Security Standards Products Meet Singapore has launched an IoT cybersecurity labelling program intended to improve the baseline security of internet-connected consumer products.

IoT 161

Singapore Expands Consumer IoT Labelling

Data Breach Today

Now Included: IP Cameras, Smart Door Locks, Lights and Printers Singapore is expanding a labelling program that allows buyers to see at a glance the cybersecurity readiness of a consumer IoT device.

IoT 147

Ransomware Attack Foils IoT Giant Sierra Wireless

Threatpost

The ransomware attack has impacted the IoT manufacturer's production lines across multiple sites, and other internal operations. Hacks IoT Malware

IoT 111

Analysis: Keeping IoT Devices Secure

Data Breach Today

This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity

IoT 165

Gartner on Enterprise IoT: Segment and Isolate Everything

Data Breach Today

Tim Zimmerman Says Organizations Need IoT Security Policies What's that IoT device on your network? That's why Gartner analyst Tim Zimmerman says enterprises need to create IoT security policies and governance rules to reduce risk

IoT 156

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. Are these examples actually risks in IoT? IoT firmware should be self-healing. IoT Security

IoT 111

Survey: Security Concerns Slow Down IoT Deployments

Data Breach Today

Preventing Ransomware and Other Malware Attacks Is Top of Mind for Enterprises Worries over ransomware and malware are slowing down enterprise IoT deployments, which is a reflection of the reputational and customer relationship risks at stake, according to a new survey.

IoT 192

IoT Supply Chains: Where Risks Abound

Data Breach Today

ENISA Releases Guidance on Reducing IoT Supply Chain Risk IoT devices are like sausages: They're full of components of varying quality, and it's invariably disturbing to think about their origins.

IoT 156

How to Build a Resilient IoT Framework

Dark Reading

For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges

IoT 111

US House Passes IoT Cybersecurity Improvement Act

Security Affairs

House of Representatives passed the IoT Cybersecurity Improvement Act, a bill that aims at improving the security of IoT devices. House of Representatives last week passed the IoT Cybersecurity Improvement Act, a bill designed to improve the security of IoT devices.

IoT 107

Can Nanotech Secure IoT Devices From the Inside-Out?

Threatpost

Work's being done with uber-lightweight nanoagents on every IoT device to stop malicious behavior, such as a scourge of botnet attacks, among other threats. IoT Malware Mobile Security RSAC Vulnerabilities

IoT 114

Federal IoT Guidelines Move Closer to Becoming Law

Data Breach Today

IoT Products Would Have to Meet Minimum Security Requirements for Use by Government Legislation that establishes minimum security standards for IoT devices procured by the federal government is moving closer to becoming law.

IoT 204

IoT Vendor Sierra Wireless Reports Ransomware Attack

Data Breach Today

Multiple Systems Impacted, Including Manufacturing and Internal IT Operations The Canadian Internet of Things manufacturer Sierra Wireless reported today it had suffered a ransomware attack over the weekend, forcing it to halt production at its manufacturing sites.

IoT 189

The IoT Application Checklist

RFID Global Solution, Inc.

It was Kevin Ashton, co-founder of MIT’s Auto-ID Center, who first used … The IoT Application Checklist Read More ». The post The IoT Application Checklist appeared first on RFID Global Solution. Blog IoT iot applications iot platform

IoT 52

2019 IoT Security Outlook

Data Breach Today

DigiCert just conducted a global study of how organizations across sectors are approaching IoT security. What are some of the best practices of the organizations that emphasize securing connected devices? Mike Nelson of DigiCert shares the findings

IoT 148

How IoT Changes Security

Data Breach Today

Steve Rog of ForeScout Technologies on Improving Security Hygiene The growth of IoT means traditional methods of security are inadequate, says Steve Rog of ForeScout Technologies, who calls for improvements in security hygiene

IoT 160

Kaiji Botnet Targets Linux Servers, IoT Devices

Data Breach Today

Researchers: Malware Is Capable of Launching DDoS Attacks Kaiji, a newly discovered botnet, is compromising Linux servers and IoT devices using brute-force methods that target the SSH protocol, according to the security firm Intezer.

IoT 186

Even in Test Mode, New Mirai Variant Infecting IoT Devices

Data Breach Today

Researchers: 'Katana' Features Many Enhancements A greatly enhanced variant of the powerful Mirai botnet is already infecting IoT devices even though it's operating in a test environment, according to researchers at cybersecurity firm Avira Protection Lab

IoT 191

5 Fundamental But Effective IoT Device Security Controls

Threatpost

Matt Dunn, the associate managing director for cyber-risk at Kroll, discusses how to keep networks safe from insecure IoT devices. Cloud Security InfoSec Insider IoT Malware Vulnerabilities Web Security

IoT 114

IoT Cybersecurity Improvement Act Passed, Heads to President’s Desk

Threatpost

Security experts praised the newly approved IoT law as a step in the right direction for insecure connected federal devices.

IoT 114

IoT Security Principles

Schneier on Security

They call for: Distinguishing between consumer and industrial IoT. And if you need more security and privacy principles for the IoT, here's a list of over twenty. The BSA -- also known as the Software Alliance, formerly the Business Software Alliance -- is an industry lobbying group.

IoT 103

Latest Mirai Variant Targets SonicWall, D-Link and IoT Devices

Threatpost

A new Mirai variant is targeting known flaws in D-Link, Netgear and SonicWall devices, as well as newly-discovered flaws in unknown IoT devices. IoT Malware Vulnerabilities

IoT 111

New Malware Family Assembles IoT Botnet

Dark Reading

Mozi' combines code from three previously known IoT malware

IoT 113

More Than Half of IoT Devices Vulnerable to Severe Attacks

Threatpost

A full 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network.

IoT 114

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

billion Internet of Things (IoT) devices. As more information about IoT device vulnerabilities is published, the pressure on industry and government authorities to enhance security standards might be reaching a tipping point. Implications for IoT devices.

IoT 94

How Amazon and Walmart Could Fix IoT Security

Data Breach Today

Bruce Schneier Says Pressure on Retailers Could Fix Insecure IoT Supply Chains IoT devices can be made cheaply and quickly. But as a result, they may lack adequate security features.

IoT 161

Coming Soon: 'Trust Mark' Certification for IoT Devices

Data Breach Today

Program, Which Could Become Global, Designed to Evaluate Security of Connected Devices An Australian IoT alliance is developing a certification program designed to raise security standards for connected device manufacturers and give consumers more confidence that they're buying secure devices.

IoT 211

More Than 1,000 IoT Security Guidelines: Which One to Use?

Data Breach Today

Study Suggests Actionable Recommendations Would Improve IoT Security With more than 1,000 IoT security guidelines, recommendations and best practices, which ones should an organization follow?

IoT 177

Microsoft Warns 25 Critical Vulnerabilities in IoT, Industrial Devices

Threatpost

IoT VulnerabilitiesAzure Defender security team discovers that memory allocation is a systemic problem that can allow threat actors to execute malicious code remotely or cause entire systems to crash.

IoT 114

Conti Gang Hits IoT Chipmaker Advantech with $14M Ransom Demand

Threatpost

IoT Malware Web Security $14 million ransom Advantech conti cyberattack Industrial IoT Internet of things ransomwareThe ransomware group has leaked stolen data to add pressure on the company to pay up.

IoT 114

Researchers: IoT Botnets Could Influence Energy Prices

Data Breach Today

Paper Describes How Connected Devices Could Be Used to Manipulate Markets High-wattage IoT devices and appliances, such as connected refrigerators, air conditioners and heaters, could be turned into massive botnets by malicious actors and used to influence energy prices, according to an academic study released at Black Hat 2020.

IoT 147

The Role of 'Prosilience' in IoT Security

Data Breach Today

The latest edition of the ISMG Security Report features a discussion of the role of "prosilience" in IoT security, plus the problem of overnotification under GDPR and the notion of "Spartacus as a Service

IoT 191

IoT Vulnerability Disclosure Platform Launched

Dark Reading

VulnerableThings.com is intended to help vendors meet the terms of a host of new international IoT security laws and regulations

IoT 83

'Heh' Botnet Targets Telnet on IoT Devices

Data Breach Today

Researchers Say Bot Code Could Wipe Disks Clean Security researchers with the Chinese company Qihoo say they've spotted a new IoT botnet that brute forces telnet ports on routers and other devices and is coded with a command to erase infected devices

IoT 134

Extinguishing the IoT Insecurity Dumpster Fire

Threatpost

Or will legislation - such as the recent UK mandate announced this week - help boost IoT security? IoT Podcasts Privacy DDoS attack IoT security iot security solution P2P PKI uk iot regulation US IoT BillWill connected devices be insecure forever?

IoT 86

Japan's IoT Scanning Project: Insecure Devices Found

Data Breach Today

The results are encouraging, and the country's program could serve as a model for other nations aiming to avoid large-scale IoT security problems

IoT 147

Hacking IoT & RF Devices with BürtleinaBoard

Security Affairs

How to hack IoT & RF Devices with BürtleinaBoard. Few months ago I have presented #FocacciaBoard : a similar multipurpose breakout board that uses the famous FT232H to handle multiple protocols commonly found in (I)IoT devices (i.e.

IoT 113

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders. He found that 39 percent of the vulnerable IoT things were in China; another 19 percent are located in Europe; seven percent of them are in use in the United States. If the code stamped on your IoT device begins with one of these, it is vulnerable.

IoT 206