IoT

Bosch Nutrunner Vulnerabilities Could Aid Hacker Attacks Against Automotive Production Lines

Bosch Nutrunner Vulnerabilities Could Aid Hacker Attacks Against Automotive Production Lines 2024-01-09 at 16:01 By Eduard Kovacs Hackers can take complete control of Bosch Rexroth nutrunners, installing ransomware or altering settings to cause financial impact and brand damage. The post Bosch Nutrunner Vulnerabilities Could Aid Hacker Attacks Against Automotive Production Lines appeared first on SecurityWeek. […]

React to this headline:

Loading spinner

Bosch Nutrunner Vulnerabilities Could Aid Hacker Attacks Against Automotive Production Lines Read More »

Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure

Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure 2024-01-05 at 13:32 By Eduard Kovacs Ukraine said Russia hacked two surveillance cameras and used them to spy on air defense systems and critical infrastructure in Kyiv.  The post Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure

React to this headline:

Loading spinner

Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure Read More »

Wi-Fi 7’s mission-critical role in enterprise, industrial networking

Wi-Fi 7’s mission-critical role in enterprise, industrial networking 2024-01-02 at 06:31 By Mirko Zorz As we transition from Wi-Fi 6 to the more advanced Wi-Fi 7, we uncover the significant enhancements in speed, efficiency, and spectrum usage that set it apart from its predecessors. In this Help Net Security interview, Tiago Rodrigues, CEO at Wireless

React to this headline:

Loading spinner

Wi-Fi 7’s mission-critical role in enterprise, industrial networking Read More »

Every “Thing” Everywhere All at Once

Every “Thing” Everywhere All at Once 19/12/2023 at 15:48 By Danelle Au Every asset in an organization’s inventory that is not accounted for and protected is a potential attack vector that an attacker can use to gain access or move undetected. The post Every “Thing” Everywhere All at Once appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Every “Thing” Everywhere All at Once Read More »

MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure

MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure 13/12/2023 at 19:02 By Eduard Kovacs MITRE and partners unveil EMB3D, a new threat model designed for critical infrastructure embedded devices. The post MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure Read More »

AI disinformation campaigns pose major threat to 2024 elections

AI disinformation campaigns pose major threat to 2024 elections 17/11/2023 at 08:32 By Help Net Security AI, post-quantum cryptography, zero trust, cryptography research, and election security will shape cybersecurity strategies in the present and for 2024, according to NTT. As the world emerged from the pandemic and continued to adapt to the rapid implementation of

React to this headline:

Loading spinner

AI disinformation campaigns pose major threat to 2024 elections Read More »

Chainlink (LINK) pumps 26% in 6 days — Is there room for more?

Chainlink (LINK) pumps 26% in 6 days — Is there room for more? 09/11/2023 at 01:02 By Cointelegraph By Marcel Pechman LINK token continues to strengthen as professional traders and enterprise solution clients enter Chainlink’s ecosystem. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Chainlink (LINK) pumps 26% in 6 days — Is there room for more? Read More »

IoT’s convenience comes with cybersecurity challenges

IoT’s convenience comes with cybersecurity challenges 30/10/2023 at 07:03 By Help Net Security The rapid proliferation of Internet of Things (IoT) devices has ushered in a new era of connectivity and convenience, transforming the way we live and work. However, this interconnectivity has also given rise to a host of cybersecurity challenges and vulnerabilities. Protecting

React to this headline:

Loading spinner

IoT’s convenience comes with cybersecurity challenges Read More »

IoT security threats highlight the need for zero trust principles

IoT security threats highlight the need for zero trust principles 27/10/2023 at 07:31 By Help Net Security The high number of attacks on IoT devices represents a 400% increase in malware compared to the previous year, according to Zscaler. The increasing frequency of malware attacks targeting IoT devices is a significant concern for OT security,

React to this headline:

Loading spinner

IoT security threats highlight the need for zero trust principles Read More »

OT cyber attacks proliferating despite growing cybersecurity spend

OT cyber attacks proliferating despite growing cybersecurity spend 26/10/2023 at 07:32 By Help Net Security The sharp increase in attacks on operational technology (OT) systems can be primarily attributed to two key factors: the escalating global threats posed by nation-state actors and the active involvement of profit-driven cybercriminals (often sponsored by the former). The lack

React to this headline:

Loading spinner

OT cyber attacks proliferating despite growing cybersecurity spend Read More »

What is operational risk and why should you care? Assessing SEC rule readiness for OT and IoT

What is operational risk and why should you care? Assessing SEC rule readiness for OT and IoT 25/10/2023 at 07:31 By Help Net Security The newly released Security and Exchange Commission (SEC) cyber incident disclosure rules have been met with mixed reviews. Of particular concern is whether public companies who own and operate industrial control

React to this headline:

Loading spinner

What is operational risk and why should you care? Assessing SEC rule readiness for OT and IoT Read More »

Inadequate IoT protection can be a costly mistake

Inadequate IoT protection can be a costly mistake 16/10/2023 at 06:34 By Help Net Security 97% of organizations are struggling to secure their IoT and connected products to some degree, according to Keyfactor. The research survey also found that 98% of organizations experienced certificate outages in the last 12 months, costing an average of over

React to this headline:

Loading spinner

Inadequate IoT protection can be a costly mistake Read More »

Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545)

Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545) 11/10/2023 at 13:31 By Zeljka Zorz Curl v8.4.0 is out, and fixes – among other things – a high-severity SOCKS5 heap buffer overflow vulnerability (CVE-2023-38545). Appropriate patches for some older curl versions have been released, too. Preparation for the security updates A little over a

React to this headline:

Loading spinner

Curl project squashes high-severity bug in omnipresent libcurl library (CVE-2023-38545) Read More »

Eyes everywhere: How to safely navigate the IoT video revolution

Eyes everywhere: How to safely navigate the IoT video revolution 05/10/2023 at 12:31 By Help Net Security Cameras are coming to a connected device near you. Cheap image sensors from old mobile phones are flooding the market and bringing video to the Internet of Things (IoT). Vacuum cleaners, bird feeders, connected cars and even smart

React to this headline:

Loading spinner

Eyes everywhere: How to safely navigate the IoT video revolution Read More »

Making privacy sustainable: Incorporating privacy into the ESG agenda

Making privacy sustainable: Incorporating privacy into the ESG agenda 04/10/2023 at 08:02 By Help Net Security Data breaches have been rising in frequency and magnitude over the last two decades. In fact, the Identity Theft Resource Centre (ITRC) found that between 2005 and 2020, data breach events in the US alone increased from 57 to

React to this headline:

Loading spinner

Making privacy sustainable: Incorporating privacy into the ESG agenda Read More »

The power of passive OS fingerprinting for accurate IoT device identification

The power of passive OS fingerprinting for accurate IoT device identification 31/08/2023 at 07:31 By Help Net Security The number of IoT devices in enterprise networks and across the internet is projected to reach 29 billion by the year 2030. This exponential growth has inadvertently increased the attack surface. Each interconnected device can potentially create

React to this headline:

Loading spinner

The power of passive OS fingerprinting for accurate IoT device identification Read More »

IEEE 802.11az provides security enhancements, solves longstanding problems

IEEE 802.11az provides security enhancements, solves longstanding problems 25/08/2023 at 07:04 By Mirko Zorz In this Help Net Security interview, Jonathan Segev, IEEE 802.11 Task Group (TG) Chair of next-generation positioning (TGaz) at IEEE, discusses IEEE 802.11az. The new standard will enable accuracy to less than 0.1 meters, which is a significant improvement from the

React to this headline:

Loading spinner

IEEE 802.11az provides security enhancements, solves longstanding problems Read More »

Smart Cities: Utopian Dream, Security Nightmare, or Political Gimmick?

Smart Cities: Utopian Dream, Security Nightmare, or Political Gimmick? 23/08/2023 at 19:18 By Kevin Townsend As smart cities evolve with more and more integrated connected services, cybersecurity concerns will increase dramatically. The post Smart Cities: Utopian Dream, Security Nightmare, or Political Gimmick? appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Smart Cities: Utopian Dream, Security Nightmare, or Political Gimmick? Read More »

IT’s rising role in physical security technology

IT’s rising role in physical security technology 22/08/2023 at 07:34 By Help Net Security As the adoption of cloud-based and mobile-access security systems continues to increase among both new and established businesses, the lines between traditional physical security personnel and IT staff are beginning to blur. Traditionally, the common approach towards organizational security has always

React to this headline:

Loading spinner

IT’s rising role in physical security technology Read More »

Scroll to Top