Security Experts:

long dotted


Tens of millions of switches, routers, IP phones, and cameras from Cisco are exposed to attacks due to vulnerabilities found in the discovery protocol they use. [Read More]
Researchers have demonstrated an ability to compromise an IoT smart bulb, and then use malware from the internet-connected bulb to infiltrate the rest of a network. [Read More]
Medtronic has only now released fixes for cardiac device vulnerabilities disclosed in 2018 and 2019, which shows it’s not easy to roll out patches for such complex and safety-critical systems. [Read More]
A researcher has discovered more than 60 vulnerabilities across 20 video surveillance and access control systems, including critical flaws that can be exploited remotely to take complete control of a device. [Read More]
Measurement instruments that support the SCPI legacy protocol are exposed to attacks where hackers could damage devices. [Read More]
Millions of devices present in smart cities, industrial environments, smart homes, vehicles and healthcare organizations could be exposed to attacks due to LoRaWAN vulnerabilities. [Read More]
Cisco has launched an industrial IoT security solution to provide organizations enhanced visibility across their IT and OT environments and help them detect threats. [Read More]
Several serious vulnerabilities have been found by researchers in patient monitoring products made by GE Healthcare. The vendor is working on patches. [Read More]
Two serious vulnerabilities found in Honeywell video surveillance systems can be exploited by hackers to take complete control of the system and access video feeds. [Read More]
The United States pressed France on Wednesday to take "strong security measures" against potential breaches from 5G services provided by Chinese telecommunications firm Huawei, saying failure to do so could imperil intelligence exchanges. [Read More]


rss icon

Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.