March 10, 2020
Via: Security IntelligenceInternet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or wireless connections and expanding the enterprise attack surface. In fact, enterprises nowadays likely have more internet […]
Threats & Malware, Vulnerabilities
March 4, 2020
Via: Security IntelligenceThe medical internet of things (IoT) is no longer a futuristic concept. It is here today, and it includes devices you may have never considered a part of the patient care ecosystem, such as elevators, beds, exit signs and clocks. […]
March 2, 2020
Via: Help Net SecurityThe percentage of companies admitting to suffering a mobile-related compromise has grown (39%, when compared to last years’ 33%) despite a higher percentage of organizations deciding not to sacrifice the security of mobile and IoT devices to meet business targets, […]
March 2, 2020
Via: CSO OnlineWith 5G poised to become widely available across the globe, enterprise organizations need to seriously consider the security implications of deploying the technology. Over the next few years, 5G networks are expected to play a central role in enabling new […]
February 14, 2020
Via: Help Net SecurityThe developments in the area of cybersecurity are alarming. As the number of smart devices in private households increases, so do the opportunities for cyber criminals to attack, TÜV Rheinland reveals. Uncontrolled access to personal data undermines confidence in the […]
February 14, 2020
Via: Security IntelligenceAfter 20 years of prominence, distributed denial-of-service (DDoS) attacks may be causing more devastating effects than ever. The first DDoS attack occurred way back on July 22, 1999 when a network of 114 computers infected with a malicious script called […]
Access control, Network security, Security
February 13, 2020
Via: Security IntelligenceWeak passwords can hurt any organization’s security efforts and make any device easily hackable, but could they also be the greatest point of failure for internet of things (IoT) security? Weak passwords certainly put companies deploying IoT devices at greater […]
January 28, 2020
Via: CSO OnlineSpoiler alert: you’re not going to wake up from this nightmare anytime soon. Currently, we have over 26-billion internet of things (IoT) devices running in our workplaces, offices and homes. Of those, I’d guess — let me think about this […]
August 21, 2019
Via: Security IntelligenceThe French writer Jean-Baptiste Alphonse Karr once said, “Plus ça change, plus c’est la même chose,” which translates to, “The more things change, the more they stay the same.” What does this have to do with the industrial internet of […]
Cloud security, Network security, Security
June 6, 2019
Via: Threat PostInternet of things (IoT) device security continues to worry the tech industry – however, experts believe that the right type of global regulation could be key for ensuring security standards. The question is when those regulatory efforts will be fleshed […]
December 12, 2018
Via: Help Net SecurityA future where the Internet of Things spreads exponentially is almost certain. Seemingly everybody wants these devices: consumers for the helpful features and manufacturers for the ability to collect data about the product and consumers’ use of it. Paul Calatayud, […]
Tech, Threats & Malware, Vulnerabilities
May 30, 2018
Via: Help Net SecurityAs smart cities integrate connected technologies to operate more efficiently and improve the quality of city services, new vulnerabilities arise that require diligent governance of municipal technology. Global ISACA survey respondents flag the energy sector to be the critical infrastructure system most […]
March 16, 2018
Via: Security IntelligenceCompanies operating within the industrial and energy and utilities sectors are responsible for protecting the critical infrastructure we all rely upon to live. However, these companies must also operate their businesses more effectively and efficiently to meet consumer and government […]
July 19, 2017
Via: Help Net SecurityBusinesses prefer storing data in the cloud but plan to invest in extra security precautions, according to B2B ratings and reviews firm Clutch. Nearly 70% of businesses on the cloud prefer storing data in the cloud instead of on a legacy […]
Identity theft, Mobile security
July 11, 2017
Via: Security IntelligenceThe Internet of Things: Enabling Innovation and Exploitation Stop checking whether or not you’ve achieved your step goal. Right now. The widespread use of bring-your-own-device (BYOD) strategies and the shift towards interoperability within the Internet of Things (IoT) — the […]
June 15, 2017
Via: Dark ReadingIn the not-so-distant future, smart cities will weave the Internet of Things (IoT) and interconnected devices into existing technology infrastructure to bring entire communities online. Singapore, for example, recently launched its Smart Nation program, deploying citywide sensors and monitors to […]
June 6, 2017
Via: Help Net SecurityNearly half of U.S. firms using an Internet of Things (IoT) network have been hit by a recent security breach, which can cost up to 13% of smaller companies’ annual revenue, according to a new survey by Altman Vilandrie & […]
May 23, 2017
Via: Help Net SecurityEven though many IoT devices for smart homes encrypt their traffic, a passive network observer – e.g. an ISP, or a neighborhood WiFi eavesdropper – can infer consumer behavior and sensitive details about users from IoT device-associated traffic rate metadata. […]
May 15, 2017
Via: InfoWorldSecurity, trust, and data integrity The emergence of the internet of things is altering our personal technology security paradigm and is a game-changer in customer/business interaction, in part due to the wide scope of available data and sheer number of […]
May 5, 2017
Via: Help Net SecurityThe cybersecurity landscape grows seemingly more complex – and dangerous – by the day: Hackers and other bad actors unleash increasingly intricate and formidable attacks, on more mission critical systems. Yet, organizations attempt to counter their threats with the same […]