article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages. Related: Companies sustain damage from IoT attacks That was back in 1982.

IoT 279
article thumbnail

Exclusive: Lithuania under cyber-attack after the ban on Russian railway goods

Security Affairs

Cyber Spetsnaz is targeting Lithuanian government resources and critical infrastructure – the recent ban on Russian railway goods has caused a new spike of hacktivist activity on the Dark Web. June 20th one of the units of Cyber Spetnaz called “Zarya” has announced the attack against www.mna.gov.lv Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pro-Russian hackers launched a massive DDoS attack against Norway

Security Affairs

Norway’s National Security Authority (NSM) confirmed that a DDoS attack took down some of the country’s most important websites. NSM did not explicitly attribute the attacks to a threat actor, but the Pro-Russian Legion/Cyber Spetsnaz group published on its Telegram channel a list of Norwegian organizations to target.

DDOS 89
article thumbnail

Cybersecurity Risks in IoT and Fleet Management Systems

IT Security Guru

The arrival of the IoT has made fleet management systems very popular among organizations that have a fleet of vehicles as part of their operations. Nevertheless, the development of IoT and fleet management systems brings up issues with cybersecurity risks.

IoT 57
article thumbnail

DDoS attacks and 5G: everything you need to know

Security Boulevard

Cybersecurity geeks may already know this historical tidbit… The first DDoS attack occurred back in 1999, when a computer at the University of Minnesota suddenly came under attack from a network of 114 other computers infected with a malicious script called Trin00.

DDOS 126
article thumbnail

LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT Networks

Threatpost

New research from IOActive has found that “blindly” trusting the encryption of the widely adopted device protocol can lead to DDoS, sending of false data and other cyber attacks.

article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

As most of us know, IoT devices are on the rise in enterprise networks. According to McKinsey & Company , the proportion of organizations that use IoT products has grown from 13 percent in 2014 to 25 percent today. The issue is that these tens of billions of new devices will likely amplify the inherent security risks of IoT.

IoT 122