IoT

Dangerous Liaisons: The Interaction Between Threat Actors and High-Risk Devices

Dangerous Liaisons: The Interaction Between Threat Actors and High-Risk Devices 2024-06-11 at 15:16 By Kevin Townsend Forescout’s 2024 analysis of the riskiest devices highlights vulnerabilities and threat actor interactions across IT, IoT, OT, and IoMT. The post Dangerous Liaisons: The Interaction Between Threat Actors and High-Risk Devices appeared first on SecurityWeek. This article is an […]

React to this headline:

Loading spinner

Dangerous Liaisons: The Interaction Between Threat Actors and High-Risk Devices Read More »

Cybersecurity Labeling for Smart Devices Aims to Help People Choose Items Less Likely to be Hacked

Cybersecurity Labeling for Smart Devices Aims to Help People Choose Items Less Likely to be Hacked 2024-05-23 at 16:17 By Associated Press Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards. The post Cybersecurity Labeling for Smart Devices Aims to Help People

React to this headline:

Loading spinner

Cybersecurity Labeling for Smart Devices Aims to Help People Choose Items Less Likely to be Hacked Read More »

Regulators are coming for IoT device security

Regulators are coming for IoT device security 2024-05-09 at 08:01 By Help Net Security Cybersecurity is a relatively new challenge for many IoT device makers who have traditionally produced non-connected devices. These devices were less vulnerable to exploitation and, as a result, manufacturers often lack the expertise and experience needed to effectively secure their connected

React to this headline:

Loading spinner

Regulators are coming for IoT device security Read More »

How to protect IP surveillance cameras from Wi-Fi jamming

How to protect IP surveillance cameras from Wi-Fi jamming 2024-04-15 at 08:02 By Help Net Security Gone are the days of criminals cutting camera wires to evade detection: with the proliferation of affordable internet-connected cameras, burglars must resort to Wi-Fi jamming. Blocking the signal blinds the device and stalls home and business surveillance systems, which

React to this headline:

Loading spinner

How to protect IP surveillance cameras from Wi-Fi jamming Read More »

Thousands of LG TVs Possibly Exposed to Remote Hacking

Thousands of LG TVs Possibly Exposed to Remote Hacking 2024-04-10 at 15:38 By Eduard Kovacs Many LG TVs may be vulnerable to remote hacking due to a series of vulnerabilities found by Bitdefender researchers. The post Thousands of LG TVs Possibly Exposed to Remote Hacking appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Thousands of LG TVs Possibly Exposed to Remote Hacking Read More »

Healthcare’s cyber resilience under siege as attacks multiply

Healthcare’s cyber resilience under siege as attacks multiply 2024-04-04 at 07:01 By Mirko Zorz In this Help Net Security interview, Eric Demers, CEO of Madaket Health, discusses prevalent cyber threats targeting healthcare organizations. He highlights challenges in protecting patient data due to infrastructure limitations and the role of employee awareness in preventing insider threats. Demers

React to this headline:

Loading spinner

Healthcare’s cyber resilience under siege as attacks multiply Read More »

Some Doorbell Cameras Sold on Amazon and Other Online Sites Have Major Security Flaws, Report Says

Some Doorbell Cameras Sold on Amazon and Other Online Sites Have Major Security Flaws, Report Says 2024-03-02 at 14:47 By Associated Press Major vulnerabilities were found in cameras manufactured by the Chinese company Eken Group Ltd., which produces video doorbells under the brand names EKEN and Tuck, among others. The post Some Doorbell Cameras Sold

React to this headline:

Loading spinner

Some Doorbell Cameras Sold on Amazon and Other Online Sites Have Major Security Flaws, Report Says Read More »

Device Authority Raises $7M for Enterprise IoT Identity and Access Management Platform 

Device Authority Raises $7M for Enterprise IoT Identity and Access Management Platform  2024-02-07 at 16:31 By Eduard Kovacs Device Authority raises $7 million in a Series A funding round for its enterprise identity and access management for IoT solution. The post Device Authority Raises $7M for Enterprise IoT Identity and Access Management Platform  appeared first

React to this headline:

Loading spinner

Device Authority Raises $7M for Enterprise IoT Identity and Access Management Platform  Read More »

Nozomi Unveils Wireless Security Sensor for OT, IoT Environments 

Nozomi Unveils Wireless Security Sensor for OT, IoT Environments  2024-01-26 at 12:16 By Eduard Kovacs Nozomi Networks extends its offering with Guardian Air, a security sensor designed to help organizations detect wireless threats in OT and IoT. The post Nozomi Unveils Wireless Security Sensor for OT, IoT Environments  appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Nozomi Unveils Wireless Security Sensor for OT, IoT Environments  Read More »

Ho, Ho, Hoooold on a Minute: A New Year Resolution That IoT Isn’t a Gift That Keeps on Taking

Ho, Ho, Hoooold on a Minute: A New Year Resolution That IoT Isn’t a Gift That Keeps on Taking 2024-01-16 at 18:16 By Tom Eston Some IoT products may make your life easier, but they also may be somewhat of a Trojan Horse.  The post Ho, Ho, Hoooold on a Minute: A New Year Resolution

React to this headline:

Loading spinner

Ho, Ho, Hoooold on a Minute: A New Year Resolution That IoT Isn’t a Gift That Keeps on Taking Read More »

Coming Soon to a Network Near You: More Shadow IoT

Coming Soon to a Network Near You: More Shadow IoT 2024-01-11 at 17:31 By Danelle Au Consumer IoT devices will increase the threat to commercial, government, healthcare, educational, and other organizations. The post Coming Soon to a Network Near You: More Shadow IoT appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Coming Soon to a Network Near You: More Shadow IoT Read More »

Bosch Nutrunner Vulnerabilities Could Aid Hacker Attacks Against Automotive Production Lines

Bosch Nutrunner Vulnerabilities Could Aid Hacker Attacks Against Automotive Production Lines 2024-01-09 at 16:01 By Eduard Kovacs Hackers can take complete control of Bosch Rexroth nutrunners, installing ransomware or altering settings to cause financial impact and brand damage. The post Bosch Nutrunner Vulnerabilities Could Aid Hacker Attacks Against Automotive Production Lines appeared first on SecurityWeek.

React to this headline:

Loading spinner

Bosch Nutrunner Vulnerabilities Could Aid Hacker Attacks Against Automotive Production Lines Read More »

Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure

Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure 2024-01-05 at 13:32 By Eduard Kovacs Ukraine said Russia hacked two surveillance cameras and used them to spy on air defense systems and critical infrastructure in Kyiv.  The post Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure

React to this headline:

Loading spinner

Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure Read More »

Wi-Fi 7’s mission-critical role in enterprise, industrial networking

Wi-Fi 7’s mission-critical role in enterprise, industrial networking 2024-01-02 at 06:31 By Mirko Zorz As we transition from Wi-Fi 6 to the more advanced Wi-Fi 7, we uncover the significant enhancements in speed, efficiency, and spectrum usage that set it apart from its predecessors. In this Help Net Security interview, Tiago Rodrigues, CEO at Wireless

React to this headline:

Loading spinner

Wi-Fi 7’s mission-critical role in enterprise, industrial networking Read More »

Every “Thing” Everywhere All at Once

Every “Thing” Everywhere All at Once 19/12/2023 at 15:48 By Danelle Au Every asset in an organization’s inventory that is not accounted for and protected is a potential attack vector that an attacker can use to gain access or move undetected. The post Every “Thing” Everywhere All at Once appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Every “Thing” Everywhere All at Once Read More »

MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure

MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure 13/12/2023 at 19:02 By Eduard Kovacs MITRE and partners unveil EMB3D, a new threat model designed for critical infrastructure embedded devices. The post MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure Read More »

AI disinformation campaigns pose major threat to 2024 elections

AI disinformation campaigns pose major threat to 2024 elections 17/11/2023 at 08:32 By Help Net Security AI, post-quantum cryptography, zero trust, cryptography research, and election security will shape cybersecurity strategies in the present and for 2024, according to NTT. As the world emerged from the pandemic and continued to adapt to the rapid implementation of

React to this headline:

Loading spinner

AI disinformation campaigns pose major threat to 2024 elections Read More »

Chainlink (LINK) pumps 26% in 6 days — Is there room for more?

Chainlink (LINK) pumps 26% in 6 days — Is there room for more? 09/11/2023 at 01:02 By Cointelegraph By Marcel Pechman LINK token continues to strengthen as professional traders and enterprise solution clients enter Chainlink’s ecosystem. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Chainlink (LINK) pumps 26% in 6 days — Is there room for more? Read More »

IoT’s convenience comes with cybersecurity challenges

IoT’s convenience comes with cybersecurity challenges 30/10/2023 at 07:03 By Help Net Security The rapid proliferation of Internet of Things (IoT) devices has ushered in a new era of connectivity and convenience, transforming the way we live and work. However, this interconnectivity has also given rise to a host of cybersecurity challenges and vulnerabilities. Protecting

React to this headline:

Loading spinner

IoT’s convenience comes with cybersecurity challenges Read More »

IoT security threats highlight the need for zero trust principles

IoT security threats highlight the need for zero trust principles 27/10/2023 at 07:31 By Help Net Security The high number of attacks on IoT devices represents a 400% increase in malware compared to the previous year, according to Zscaler. The increasing frequency of malware attacks targeting IoT devices is a significant concern for OT security,

React to this headline:

Loading spinner

IoT security threats highlight the need for zero trust principles Read More »

Scroll to Top