Security Experts:

long dotted


The maker of a 'smart' male chastity device has recommended using a screwdriver to break them open after warnings they can be locked remotely by hackers. [Read More]
Two security researchers explain how they were able to hack into the command and control (C&C) panels of 10 IoT botnets. [Read More]
Researchers found a series of vulnerabilities that allowed them to turn an XR11 TV remote control from Comcast into a spying device. [Read More]
A security flaw in an internet-connected male chastity device could allow hackers to remotely lock it -- leaving users trapped, researchers have warned. [Read More]
Microsoft has shared the results of the Azure Sphere Security Research Challenge and the company said it paid out more than $374,000. [Read More]
A new Mirai-based botnet is targeting zero-day vulnerabilities in Tenda routers, according to researchers at Chinese cybersecurity company Qihoo 360. [Read More]
Cloud-based enterprise device security platform provider Eclypsium on Thursday announced raising $13 million in an oversubscribed funding round. [Read More]
HP has expanded its bug bounty program to office-class ink and toner cartridge vulnerabilities, for which the company is prepared to pay out up to $10,000. [Read More]
Mozi, a relatively new botnet, has fueled a significant increase in Internet of Things (IoT) botnet activity, IBM reported this week. [Read More]
CISA has been named a Top-Level Root CVE Numbering Authority and it will oversee CNAs that issue CVE identifiers for vulnerabilities in industrial and medical products. [Read More]


rss icon

Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.