Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Bug bounty hunters hacked a NETGEAR router and a WD NAS device on the first day of the Pwn2Own Tokyo 2020 hacking competition. [Read More]
Hackers could remotely open garage doors and gates by exploiting vulnerabilities found in a gateway device made by Hörmann. [Read More]
Akamai has acquired Asavie, an Ireland-based company that provides mobility, IoT and security solutions. [Read More]
The FDA has approved the use of a new rubric specifically designed for assigning CVSS scores to vulnerabilities found in medical devices. [Read More]
The Internet of Things Security Foundation (IoTSF), an effort aimed at improving the security of IoT, has launched an online platform designed to make the reporting of vulnerabilities in IoT devices easier. [Read More]
Google has revealed that its infrastructure was targeted in a record-breaking 2.5 Tbps DDoS attack in 2017. [Read More]
The maker of a 'smart' male chastity device has recommended using a screwdriver to break them open after warnings they can be locked remotely by hackers. [Read More]
Two security researchers explain how they were able to hack into the command and control (C&C) panels of 10 IoT botnets. [Read More]
Researchers found a series of vulnerabilities that allowed them to turn an XR11 TV remote control from Comcast into a spying device. [Read More]
A security flaw in an internet-connected male chastity device could allow hackers to remotely lock it -- leaving users trapped, researchers have warned. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.