article thumbnail

MY TAKE: ‘Digital trust’ has a huge role to play mitigating cybersecurity threats, going forward

The Last Watchdog

Related: Leveraging PKI to advance electronic signatures. It used to be that trusting the connection between a workstation and a mainframe computer was the main concern. I had the chance to talk about DigiCert’s perspective with Jason Sabin, DigiCert’s Chief Technology Officer. Here are a few key takeaways. Trust under siege.

article thumbnail

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found.

IoT 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Detection at Chip Level? Yes, Says Intel

SecureWorld News

This is possible, the company says, because of improvements to its Hardware Shield product and more powerful Threat Detection Technology (TDT). Intel's Hardware Shield and Threat Detection Technology. Bleeping Computer covered Intel's recent addition coming out of the Consumer Electronics Show (CES).

article thumbnail

Naming & Shaming Web Polluters: Xiongmai

Krebs on Security

If ever there were a technology giant that deserved to be named and shamed for polluting the Web, it is Xiongmai — a Chinese maker of electronic parts that power a huge percentage of cheap digital video recorders (DVRs) and Internet-connected security cameras. Hangzhou Xiongmai Technology Co.,

article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

Within these government labs and agencies, taking place is a groundswell of innovation in deep technology cyber disciplines to the tune of billions of dollars annually over the past three decades. In Silicon Valley, the initial technology seeds were planted in World War II, when the U.S. According to the U.S.

article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The result has been devices with trivial vulnerabilities or flaws that have been solved for a decade or longer in traditional computing. New vulnerabilities are created every day by cybercriminals, leading to many IoT devices being installed with out-of-date firmware and other exploitable vulnerabilities.”. Bambenek agreed.

Wireless 109
article thumbnail

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Cloud Protection & Licensing

It is no secret that security plays a very important part in the successful deployment and management of this technology, and its applications are set to transform the way we live and do business. What is the biggest security challenge facing the growing IoT? To do this at scale, a public key infrastructure (PKI) is required.

IoT 92