• TOP

  • IoT Threats And Solutions

IoT Threats And Solutions

2019/10/15

EU Report Highlights Cybersecurity Risks in 5G Networks

EU Report Highlights Cybersecurity Risks in 5G Networks

The extent with which 5G networks use software is one of the top security issues for mobile networks as well as devices and current technologies (for example, 3G, 4G) that use or incorporate it, according to an E.U. report supported by the European Commission and European Agency for Cybersecurity.

2019/10/09

The Industrial Control Systems (ICS) Cyber Security Atlanta Conference

The Industrial Control Systems (ICS) Cyber Security Atlanta Conference

Industrial control systems (ICSs) are deployed to improve productivity, maintenance, and safety in operational environments. Their wide-ranging applications include energy production and distribution, gas and water supply, industrial automation, traffic control systems, and state-of-the-art facility management.

2019/10/07

Answering IoT Security Questions for CISOs

Answering IoT Security Questions for CISOs

Given the permeating nature of IoT and Industrial IoT devices in our daily lives, from smart homes to smart cities, one cannot escape the growing cybersecurity risks associated with these devices.

2019/10/03

FDA Warns Against URGENT/11 Vulnerabilities Affecting Medical Devices and Hospital Networks

FDA Warns Against URGENT/11 Vulnerabilities Affecting Medical Devices and Hospital Networks

The Food and Drug Administration (FDA) notified patients, healthcare professionals, and other stakeholders, warning them of a set of 11 vulnerabilities that could put medical devices and hospital networks at risk.

2019/10/02

Securing the Industrial Internet of Things: Addressing IIoT Risks in Healthcare

Securing the Industrial Internet of Things: Addressing IIoT Risks in Healthcare

The constant quest for prolonging and preserving human life has continually driven technologies to develop groundbreaking innovations in the delivery of healthcare services and state-of-the-art treatments.

2019/10/01

Hacker Compromised Family’s Wi-Fi, Taunted Family With Thermostat, Camera for 24 Hours

Hacker Compromised Family’s Wi-Fi, Taunted Family With Thermostat, Camera for 24 Hours

A couple discovered that their Nest security system was hacked after their thermostat was repeatedly set to high temperatures despite being adjusted and the hacker started talking to them via the camera.

2019/09/25

From Homes to the Office: Revisiting Network Security in the Age of the IoT

From Homes to the Office: Revisiting Network Security in the Age of the IoT

The internet of things (IoT) has gone beyond the walls of the “house of the future” and is quickly finding its way into businesses, as many enterprises have come to recognize its potential in providing a myriad of solutions for their growing needs.

2019/09/19

The Cyber Senate 6th Annual Industrial Control Cybersecurity USA conference

The Cyber Senate 6th Annual Industrial Control Cybersecurity USA conference

Industrial facilities have been increasingly reliant on the industrial internet of things (IIoT), using devices to create more productive and efficient systems. As a result, however, the IIoT attack surface has also increased, particularly across critical infrastructures.

2019/09/18

When PSD2 Opens More Doors: The Risks of Open Banking

When PSD2 Opens More Doors: The Risks of Open Banking

As more industries adapt to cater to the increasingly mobile market, the financial industry is the latest to experience a shake-up. The Revised Payment Service Directive (PSD2) – also known as Open Banking – is a new set of rules for the European Union (EU) that’s expected to affect the global financial industry.

2019/09/16

Hacking LED Wristbands: A ‘Lightning’ Recap of RF Security Basics

Hacking LED Wristbands: A ‘Lightning’ Recap of RF Security Basics

Early this year, we published a security analysis of industrial radio remote controllers. In that research, we examined different vulnerabilities in the implementation of radio frequency (RF) communication and the possible impact of an attack on these weaknesses.

2019/09/11

Uncovering IoT Threats in the Cybercrime Underground

Uncovering IoT Threats in the Cybercrime Underground

Understanding current and future threats to the internet of things (IoT) can help shape how we secure this technology that is increasingly becoming integral to today's world. What insights can be reaped from the cybercrime underground?

2019/09/10

Default Password Exposes 600,000 GPS Trackers While Satori Botnet Author Faces Jail Time

Default Password Exposes 600,000 GPS Trackers While Satori Botnet Author Faces Jail Time

Amidst news of the Satori author pleading guilty, researchers found over 600,000 exposed GPS trackers due to the use of a default password. These two cases seemingly highlight how security issues with the internet of things (IoT) exacerbate one another — poor device security and the cybercriminals who actively take advantage of them.

2019/09/09

Spam Campaign Abuses PHP Functions for Persistence, Uses Compromised Devices for Evasion and Intrusion

Spam Campaign Abuses PHP Functions for Persistence, Uses Compromised Devices for Evasion and Intrusion

One of our honeypots detected a spam campaign that uses compromised devices to attack vulnerable web servers. After brute-forcing devices with weak access credentials, the attackers use them as proxies to forward a base64-encoded PHP script to web servers. The script sends an email with an embedded link to a scam site to specific email addresses.

2019/09/05

Finding a Better Route to Router and Home Network Security

Finding a Better Route to Router and Home Network Security

When was the last time you looked at your home router? We tend to only notice these magical boxes when something goes wrong. And given that many of us get our router as part of a single broadband box ...

2019/08/29

Abuse of WS-Discovery Protocol Can Lead to Large-Scale DDoS Attacks

Abuse of WS-Discovery Protocol Can Lead to Large-Scale DDoS Attacks

Security researchers have discovered that attackers can abuse the Web Services Dynamic Discovery (WS-Discovery) protocol to launch massive distributed denial of service (DDoS) campaigns.

Recommended Video

Cybersecurity Risks in Complex IoT Environments

Company Information

Security Blog
PageTop