Security Experts:

long dotted


Interpol announces that it has coordinated an operation targeting cryptojacking in Southeast Asia. [Read More]
BlackBerry this week announced a customizable automotive solution designed to help OEMs improve vehicle health and security. [Read More]
Venture Capital and private equity investor firm Insight Partners has agreed to acquire IoT security firm Armis in a cash deal valuing the firm at $1.1 billion. [Read More]
Google disabled all Xiaomi integrations on Nest Hub after learning that some users could access other people’s camera feeds. [Read More]
Authorities in Thailand say they are investigating an apparent online break-in by a computer hacker that allowed him to broadcast surveillance video from inside a prison in the country's south. [Read More]
A dozen vulnerabilities have been found by F-Secure researchers in popular Barco ClickShare wireless presentation systems. [Read More]
The supply chain is an increasing concern for both business and government. It comprises the chain of suppliers providing components to product vendors -- and globalization has made it worldwide, deep and complex. [Read More]
FireEye unveils its Cyber Physical Threat Intelligence service, which provides organizations context, data and actionable analysis on threats targeting OT, ICS and IoT systems. [Read More]
An attacker could exploit a vulnerability in the KeyWe Smart Lock by intercepting legitimate communications to steal the key and unlock doors at any point remotely. [Read More]
SEC Consult has open sourced the hardware and firmware components of its SEC Xtractor hardware analysis tool. [Read More]


rss icon

Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.