- The WEP and WPA2 wireless security protocols have both been discovered with vulnerabilities such as KRACK that hackers can exploit to compromise devices, spy on users, and perform other malicious activities. How can users secure their wireless connections?We discuss how manufacturers, users, and other involved parties can prevent IoT security incidents and work toward securing surveillance cameras in the market.This research examines the oft-overlooked infection vectors in today’s healthcare networks: exposed medical devices and supply chain attacks.Western European, UK, French, German, and US cities exposed. Are your connected devices searchable on the internet? Find out what you are risking.Intelligent Transportation Systems are comprised of a huge ecosystem of networks and technologies designed to regulate, direct, and control traffic. Find out what it takes to secure them against cyberattacks.Intelligent Transportation Systems are slowly being adopted all over the world. Securing the future of transportation from cyberattacks should be a top priority.Cities around the world are getting smarter, but are they being designed with security in mind?Smart security systems in buildings allow for easier, centralized management of security and safety, but these connected systems also come with exploitable vulnerabilities. This infographic provides a guide for managing these systems and securing devices.An in-depth analysis of Shodan data reveals how some of the biggest US cities fare in terms of exposed cyber assets, what this means in terms of security, and how home users and organizations can protect their data.