article thumbnail

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

The researchers set up a honeypot to collect data on infected IoT devices, the way threat actors infect IoT devices and what families of malware are involved. The first data that emerged from the study is that threat actors continue to look at the IoT devices with increasing interest. ” concludes Kaspersky.

IoT 81
article thumbnail

Weekly podcast: Reports galore and more cryptojacking

IT Governance

This week, we discuss new reports from Cisco, McAfee and the CSIS, and Big Brother Watch, and hear more about malicious Monero mining. Further analysis of the financial effects of cyber crime can be found in a report released this week by McAfee and the Center for Strategic and International Studies. Here are this week’s stories.

Mining 66
article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Compromised information includes patients’ personal data, health and medical records, financial data, internal emails and software source code. Data breached: 5 TB.