Security Experts:

long dotted


Pwn2Own Toronto 2022 is offering more than $1 million in cash and prizes, including $100,000 for a new SOHO attack scenario. [Read More]
Self-disclosures by XIoT vendors have surpassed independent research outfits as the second most prolific vulnerability reporters. [Read More]
Cybersecurity firm Cyfirma has identified more than 80,000 Hikvision cameras still affected by a critical code execution vulnerability patched in September 2021. [Read More]
Following complaints from the industry, the TSA has updated its pipeline cybersecurity requirements to provide more flexibility in achieving goals. [Read More]
Widely used Micodus vehicle GPS trackers are affected by critical vulnerabilities that can be exploited by hackers to stalk people and remotely disable cars. [Read More]
Researchers have found a vulnerability in the rolling codes mechanism of the remote keyless entry system of Honda vehicles that allows them to open the car doors and start the engine. [Read More]
Air raid sirens sounded in Israeli cities on Sunday and it appears they may have been triggered by hackers possibly operating out of Iran. [Read More]
Schneider Electric and Claroty have announced the launch of a new cybersecurity solution for buildings. [Read More]
A researcher has found a new way to hack and steal Teslas, via a Bluetooth-based relay attack that abuses a key card feature. [Read More]
Access control products from LenelS2 and other vendors using HID Mercury controllers are affected by vulnerabilities that can allow hackers to remotely unlock doors. [Read More]


rss icon

Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.