The FDA notified patients, healthcare professionals, and other stakeholders, warning them of a set of 11 vulnerabilities that could put medical devices and hospital networks at risk.
Understanding current and future threats to the internet of things (IoT) can help shape how we secure this technology that is increasingly becoming integral to today's world. What insights can be reaped from the cybercrime underground?
A look into the cybersecurity risks surrounding critical infrastructures integrated with industrial internet of things (IIoT), and the recommendations to mitigate against these threats.
Industrial facilities have been increasingly reliant on the industrial internet of things (IIoT) but these facilities also have to defend against new threats that take advantage of weaknesses and other attack vectors that come with the adoption of new technol
The hacking group Xenotime, reported to be behind intrusions targeting facilities in oil and gas industries, has started probing industrial control systems (ICSs) of power grids in the U.S. and the Asia-Pacific region.
For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start.
As manufacturing companies continue to adopt Industry 4.0, many environments could still be falling short on security with outdated systems, unpatched vulnerabilities, and unsecure files that leave them vulnerable to attacks.
In the food production industry, high-tech tools and systems are being used to optimize production conditions. But new technology brings new challenges and risks.
Radio frequency (RF) technology is being used in operations to control various industrial machines. However, the lack of implemented security in RF communication protocols could lead to production sabotage, system control, and unauthorized access.