Security Experts:

long dotted


Researchers have once again showed that many printers can still be hacked remotely; they hijacked 28,000 devices, but believe roughly half a million are vulnerable to attacks. [Read More]
Avast security researchers have identified vulnerabilities in DVB-T2 devices that could allow attackers to ensnare them in botnets. [Read More]
Recently addressed Microsoft Azure Sphere vulnerabilities could lead to the execution of arbitrary code or to elevation of privileges. [Read More]
A vulnerability discovered by IBM researchers in a communications module made by Thales could expose millions of IoT devices to attacks. [Read More]
Vulnerabilities in HDL Automation smart products could be abused to take over user accounts and remotely control devices deployed in homes, commercial buildings or hotels. [Read More]
Researchers showed at DEF CON how they managed to hack phones, cars, satellite communications, traffic lights, printers, smart devices, and popular software services. [Read More]
The first entirely virtual edition of the Black Hat cybersecurity conference took place last week and researchers from tens of organizations presented the results of their work from the past year. [Read More]
Chinese researchers describe how they found 19 vulnerabilities in a Mercedes-Benz E-Class, including ones that can be exploited to remotely hack the car. [Read More]
Researchers have discovered that devices using Wi-Fi chips from Qualcomm and MediaTek are vulnerable to Kr00k-like attacks. [Read More]
Researchers analyzed DJI’s Pilot app for Android and found some security issues, but the Chinese drone giant says the claims are “misleading.” [Read More]


rss icon

Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.