Understanding current and future threats to the internet of things (IoT) can help shape how we secure this technology that is increasingly becoming integral to today's world. What insights can be reaped from the cybercrime underground?
Another Mirai offshoot spotted: A variant of the Echobot botnet was found using over 50 exploits that lead to remote code execution (RCE), arbitrary command execution, and command injection in internet of things (IoT) devices.
As manufacturing companies continue to adopt Industry 4.0, many environments could still be falling short on security with outdated systems, unpatched vulnerabilities, and unsecure files that leave them vulnerable to attacks.
The evolution of smart homes and smart buildings into complex IoT environments reflects the continuing developments in home and industrial automation. Security should not be left behind as increased complexity also means new threats and risks.
As the field of telecommunication continues to evolve, so should its security. Understanding its current threat landscape can help reduce the impact of crimes like telecom fraud and prepare us for future threats in the age of the IoT.
A critical factor contributing to the increasing expenses on mobile phones is fraud. Recently, the cost of criminal telecom equipment has decreased to the point that individuals can launch attacks. Read our report produced in collaboration with Europol.
Blockchain is one of the key concepts in IoT conversations today, touted to accelerate the scaling of IoT implementations. However, due to its nascent nature, what could be the potential risks, and how can blockchain play a role in IoT security?
Millions of security cameras and other internet of things (IoT) devices were found with critical security flaws involving peer-to-peer (P2P) communications technology. The weaknesses can expose the devices to credential theft, eavesdropping, and hijacking.
A pivotal change to adapt to technological advances like smart factories requires a huge budget, and one critical consideration is how to get the most value out of that investment. Integrators can begin by reevaluating their security.