Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers analyzed DJI’s Pilot app for Android and found some security issues, but the Chinese drone giant says the claims are “misleading.” [Read More]
Researchers have described how a botnet powered by high-wattage IoT devices can manipulate the energy market. [Read More]
Companies affected by the BootHole vulnerability in the GRUB2 bootloader have started issuing advisories. [Read More]
Billions of Windows and Linux devices are affected by a serious GRUB2 bootloader vulnerability dubbed BootHole that can be exploited to install persistent and stealthy malware. [Read More]
The United States and the United Kingdom warned in a joint alert issued this week that a piece of malware has infected over 62,000 QNAP NAS devices. [Read More]
Netgear has started releasing patches for ten vulnerabilities affecting nearly 80 of its products, including flaws disclosed last year at the Pwn2Own hacking contest. [Read More]
Driver vulnerabilities can facilitate attacks on ATMs, PoS systems and other devices, warns firmware security company Eclypsium. [Read More]
IBM has disclosed several vulnerabilities affecting powerline extenders from Tenda and says the vendor has ignored its emails and phone calls. [Read More]
Siemens this week announced that it is acquiring UltraSoC Technologies, a provider of analytics and monitoring solutions for SoCs. [Read More]
Microsoft has acquired industrial cybersecurity company CyberX in an effort to expand its Azure IoT security capabilities and extend them to IIoT and OT. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.