Remove Architecture Remove IoT Remove Network Security Remove Presentation
article thumbnail

Attacks Escalating Against Linux-Based IoT Devices

eSecurity Planet

Incidents of malware targeting Linux-based Internet of Things (IoT) devices jumped by more than a third in 2021, with three malware families the primary drivers behind the increase. Threats to Open Source, IoT. Also read: Top IoT Security Solutions for 2022. IoT devices pose two fundamental threats,” he said.

IoT 138
article thumbnail

USENIX Security ’23 – ‘“It’s The Equivalent of Feeling Like You’re In Jail”: Lessons From Firsthand & Secondhand Accounts Of IoT-Enabled Intimate Partner Abuse’

Security Boulevard

Full Presenter List: Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.

IoT 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

Exposed enterprise IoT devices can be an indicator of security issues to come, with firms sporting exposed devices having a 62% higher density of other security problems, new research shows. Is it surprising that there’s a correlation between something like IoT exposure and other security issues?

IoT 98
article thumbnail

USENIX Security ’23 – ‘HorusEye: A Realtime IoT Malicious Traffic Detection Framework Using Programmable Switches’

Security Boulevard

Authors/Presenters: Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, Mingwei Xu Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.

IoT 45
article thumbnail

Adoption of Secure Cloud Services in Critical Infrastructure

CyberSecurity Insiders

This represents a significant shift for such industries which have traditionally relied on isolation via air-gapped networks. There are hierarchical divisions on the basis of which a network is built. IoT sensors and devices. Security controls, not just at the perimeter, but spread across ICS networks.

IoT 134
article thumbnail

New HEH botnet wipes devices potentially bricking them

Security Affairs

Researchers from from Netlab, the network security division of Chinese tech giant Qihoo 360, have discovered a new botnet, tracked as HEH, that contains the code to wipe all data from infected systems, such as routers, IoT devices, and servers. In the current version, each node cannot send control command to its peers.

article thumbnail

Extending Zero Trust Security to Industrial Networks

Cisco Security

I recently presented a webinar explaining the specific Zero Trust requirements for IoT/OT networks: Endpoint visibility. This simple workflow enables effective collaboration between IT and OT to define zone segmentation and enforce Zero Trust in the IoT/OT network. Cisco Secure Social Channels. Twitter.

IoT 92