HouseCall for Home Networks
Noticed any strange devices connected to your Wi-Fi?
Scan connected devices in your home network for security risks
Scan connected devices for security risksLearn more
IoT Threats And Solutions
The extent with which 5G networks use software is one of the top security issues for mobile networks as well as devices and current technologies (for example, 3G, 4G) that use or incorporate it, according to an E.U. report supported by the European Commission and European Agency for Cybersecurity.
Industrial control systems (ICSs) are deployed to improve productivity, maintenance, and safety in operational environments. Their wide-ranging applications include energy production and distribution, gas and water supply, industrial automation, traffic control systems, and state-of-the-art facility management.
Given the permeating nature of IoT and Industrial IoT devices in our daily lives, from smart homes to smart cities, one cannot escape the growing cybersecurity risks associated with these devices.
The Food and Drug Administration (FDA) notified patients, healthcare professionals, and other stakeholders, warning them of a set of 11 vulnerabilities that could put medical devices and hospital networks at risk.
The constant quest for prolonging and preserving human life has continually driven technologies to develop groundbreaking innovations in the delivery of healthcare services and state-of-the-art treatments.
A couple discovered that their Nest security system was hacked after their thermostat was repeatedly set to high temperatures despite being adjusted and the hacker started talking to them via the camera.
The internet of things (IoT) has gone beyond the walls of the “house of the future” and is quickly finding its way into businesses, as many enterprises have come to recognize its potential in providing a myriad of solutions for their growing needs.
Industrial facilities have been increasingly reliant on the industrial internet of things (IIoT), using devices to create more productive and efficient systems. As a result, however, the IIoT attack surface has also increased, particularly across critical infrastructures.
As more industries adapt to cater to the increasingly mobile market, the financial industry is the latest to experience a shake-up. The Revised Payment Service Directive (PSD2) – also known as Open Banking – is a new set of rules for the European Union (EU) that’s expected to affect the global financial industry.
Early this year, we published a security analysis of industrial radio remote controllers. In that research, we examined different vulnerabilities in the implementation of radio frequency (RF) communication and the possible impact of an attack on these weaknesses.
Understanding current and future threats to the internet of things (IoT) can help shape how we secure this technology that is increasingly becoming integral to today's world. What insights can be reaped from the cybercrime underground?
Amidst news of the Satori author pleading guilty, researchers found over 600,000 exposed GPS trackers due to the use of a default password. These two cases seemingly highlight how security issues with the internet of things (IoT) exacerbate one another — poor device security and the cybercriminals who actively take advantage of them.
One of our honeypots detected a spam campaign that uses compromised devices to attack vulnerable web servers. After brute-forcing devices with weak access credentials, the attackers use them as proxies to forward a base64-encoded PHP script to web servers. The script sends an email with an embedded link to a scam site to specific email addresses.
When was the last time you looked at your home router? We tend to only notice these magical boxes when something goes wrong. And given that many of us get our router as part of a single broadband box ...
Security researchers have discovered that attackers can abuse the Web Services Dynamic Discovery (WS-Discovery) protocol to launch massive distributed denial of service (DDoS) campaigns.