IoT Security
Some IoT products may make your life easier, but they also may be somewhat of a Trojan Horse.
Hi, what are you looking for?
The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.
Some IoT products may make your life easier, but they also may be somewhat of a Trojan Horse.
Consumer IoT devices will increase the threat to commercial, government, healthcare, educational, and other organizations.
Hackers can take complete control of Bosch Rexroth nutrunners, installing ransomware or altering settings to cause financial impact and brand damage.
Ukraine said Russia hacked two surveillance cameras and used them to spy on air defense systems and critical infrastructure in Kyiv.
Every asset in an organization’s inventory that is not accounted for and protected is a potential attack vector that an attacker can use to...
MITRE and partners unveil EMB3D, a new threat model designed for critical infrastructure embedded devices.
Researchers call attention to 14 security defects that can be exploited to drop and freeze 5G connections on smartphones and routers.
French startup ProvenRun raises €15 million investment to build secure software for connected vehicles and IoT devices.
Forescout has found 21 vulnerabilities in Sierra Wireless OT/IoT routers that could expose critical infrastructure organizations to remote attacks.
Smart speakers, printers, routers, NAS devices, and mobile phones were hacked on the second day at Pwn2Own Toronto 2023.
NAS devices, printers, IP cameras, speakers, and mobile phones were hacked on the first day at Pwn2Own Toronto 2023.
Australian AI researchers teach an unmanned military robot’s operating system to identify MitM cyberattacks.
BlackBerry plans to split its cybersecurity and IOT (Internet of Things) businesses and pursue an IPO for the IOT unit early next year.
Attackers can find tons of information on Tesla cars and their drivers by searching for misconfigured TeslaMate instances online.
An automotive cybersecurity study shows that critical-risk vulnerabilities have decreased in the past decade.
A silicon root of trust (S-RoT) is designed to provide security to those parts of a device that can be attacked by a third...
Norfolk Southern believes a software defect — not a hacker — was the cause of the widespread computer outage that forced the railroad to...
ZDI is offering more than $1 million at the Pwn2Own Automotive hacking contest, hosted in January at the Automotive World conference in Tokyo.
Roughly 78% of the healthcare organizations in North America, South America, the APAC region, and Europe experienced a cyberattack over the past year, according...
As smart cities evolve with more and more integrated connected services, cybersecurity concerns will increase dramatically.