Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Hackers could have caused the central touchscreen on the Tesla Model 3 to crash by getting the targeted user to visit a malicious website. [Read More]
A new Mirai variant named Mukashi has been delivered to Zyxel NAS devices via exploitation of a recently patched vulnerability tracked as CVE-2020-9054. [Read More]
Thales, Telstra, Microsoft, and Arduino this week announced a partnership aimed at enabling the secure connection of IoT devices to the cloud. [Read More]
Santa Clara, Calif-based IoT security firm Ordr has raised additional funding to bring the total amount raised by the company to roughly $50 million. [Read More]
Cisco says it will release updates for wireless devices affected by the recently disclosed Kr00k vulnerability, including routers, firewalls, access points and phones. [Read More]
A new vulnerability dubbed Kr00k, which may have affected over 1 billion Wi-Fi capable devices before patches were released, could have allowed hackers to obtain sensitive data from wireless communications. [Read More]
A new report suggests that poorly protected device identities could cost U.S. business between $15 billion and $21 billion. [Read More]
ExtraHop's Reveal(x) platform can now discover, classify, and profile the behavior of IoT devices at the network edge, providing visibility, detection and response across the entire enterprise attack surface. [Read More]
Peripheral devices with unsigned firmware can expose Windows and Linux machines to attacks, allowing hackers to steal data or take control of a computer. [Read More]
SweynTooth: security researchers have discovered numerous vulnerabilities in the Bluetooth Low Energy (BLE) implementations of major SoC vendors. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.