Understanding Global IoT Security Regulations

Security Boulevard

The IoT is maturing rapidly, and surveys show that global IoT spending will achieve a combined annual growth rate (CAGR) of 11.3% The huge potential of IoT. The post Understanding Global IoT Security Regulations appeared first on Security Boulevard.

IoT 99

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. Are these examples actually risks in IoT? IoT firmware should be self-healing. IoT Security

IoT 210
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

New Report: Ransomware, Vulnerabilities and IoT Security Threats

Security Boulevard

Nozomi Networks Labs has produced a new OT/IoT security report. Don’t miss this summary of vulnerability trends as well as important information about ransomware and IoT security camera threats.

IoT 97

Hacked IoT Devices Livestreaming Swatting Attacks: FBI

Adam Levin

The post Hacked IoT Devices Livestreaming Swatting Attacks: FBI appeared first on Adam Levin. Data Security Technology featured hacking IoT swatHackers are using internet-connected home devices to livestream “swatting” attacks, according to the FBI.

IoT 206

Overcoming IoT Asset Management Challenges

Security Boulevard

With the number of IoT devices expected to reach 55.7 The post Overcoming IoT Asset Management Challenges appeared first on Security Boulevard.

IoT 97

IoT Security Principles

Schneier on Security

They call for: Distinguishing between consumer and industrial IoT. And if you need more security and privacy principles for the IoT, here's a list of over twenty. The BSA -- also known as the Software Alliance, formerly the Business Software Alliance -- is an industry lobbying group.

IoT 183

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

During a two-week period in December 2020, Zscaler analyzed more than 575 million device transactions and blocked more than 300,000 malware attacks aimed at IoT devices, a 700 percent increase over pre-pandemic numbers. Cloud IoT security remote workforce security

IoT 95

Analyzing IoT Security Best Practices

Schneier on Security

New research: " Best Practices for IoT Security: What Does That Even Mean? " We consider categories of best practices, and how they apply over the lifecycle of IoT devices. by Christopher Bellman and Paul C.

IoT 194

Weekly Update 219: IoT Unravelled with Scott Helme

Troy Hunt

More than 200,000 unique visitors dropped by this week, mostly to read about IoT things. I topped the week off by spending a couple of hours talking to Scott Helme about our respective IoT experiences so that's the entirety of this week's update - Scott and I talking IoT. What.

IoT 162

IoT Security & Threat Modeling

Adam Shostack

There’s a new report out from the UK Government, The UK Code of Practice for Consumer IoT Security. One of the elements I want to draw attention to is: The use of IoT devices by perpetrators of domestic abuse is a pressing and deeply concerning problem that is largely hidden from view. Collecting data (and therefore evidence) on this is challenging for a number of reasons outlined in this section by Leonie Tanczer.

IoT 100

Podcast: IoT Piranhas Are Swarming Industrial Controls

Threatpost

Enormous botnets of IoT devices are going after decades-old legacy systems that are rife in systems that control crucial infrastructure. Critical Infrastructure IoT Malware Podcasts Vulnerabilities Web Security

IoT 84

Verkada Surveillance Hack, Breach Highlights IoT Risks

Security Boulevard

The post Verkada Surveillance Hack, Breach Highlights IoT Risks appeared first on Security Boulevard. Cloud Security Featured IoT & ICS Security News Security Boulevard (Original) Breach IoT Security surveillance VerkadaBuilding security vendor Verkada Inc.

IoT Security Checklist

Security Boulevard

Internet-connected devices, collectively known as the Internet of Things or IoT, can provide opportunities for attackers to access your network–and as a result, devices more sensitive than your lightbulbs. The post IoT Security Checklist appeared first on Hurricane Labs.

IoT 81

TalkingTrust with Thales: IoT Security with Keyfactor

Security Boulevard

This blog recaps TalkingTrust with Thales, an interview between Ellen Boehm, VP of IoT Strategy and Solutions at Keyfactor, and Dave Madden, Senior Director of Business Development at Thales. . The post TalkingTrust with Thales: IoT Security with Keyfactor appeared first on Security Boulevard.

IoT 82

Cataloging IoT Vulnerabilities

Schneier on Security

Recent articles about IoT vulnerabilities describe hacking of construction cranes , supermarket freezers , and electric scooters. hacking internetofthings vulnerabilities

IoT 151

Defending Against IoT Security Camera Hacks Like Verkada

Security Boulevard

The post Defending Against IoT Security Camera Hacks Like Verkada appeared first on Nozomi Networks. The post Defending Against IoT Security Camera Hacks Like Verkada appeared first on Security Boulevard.

IoT 83

IoT Unravelled Part 5: Practical Use Case Videos

Troy Hunt

This is the fifth and final part of the IoT unravelled blog series. Part 1 was all about what a mess the IoT landscape is, but then there's Home Assistant to unify it all. Opening the Garage Door Remotely The original goal of this whole IoT journey!

IoT 176

Half a Million IoT Passwords Leaked

Schneier on Security

We have a long way to go to secure the IoT. It is amazing that this sort of thing can still happen: the list was compiled by scanning the entire internet for devices that were exposing their Telnet port.

In the World of IoT Security, Lock Every Door

Security Boulevard

The post In the World of IoT Security, Lock Every Door appeared first on Security Boulevard. Cybersecurity Security Boulevard (Original) Spotlight data and network security Internet of things iot IoT Security

IoT 104

New Charges, Sentencing in Satori IoT Botnet Conspiracy

Krebs on Security

Justice Department today criminally charged a Canadian and a Northern Ireland man for allegedly conspiring to build botnets that enslaved hundreds of thousands of routers and other Internet of Things (IoT) devices for use in large-scale distributed denial-of-service (DDoS) attacks. The U.S.

IoT 194

IoT Unravelled Part 1: It's a Mess. But Then There's Home Assistant

Troy Hunt

With the benefit of hindsight, this was a naïve question: Alright clever IoT folks, I've got two of these garage door openers, what do you reckon the best way of connecting them with Apple HomeKit is? If you're going to do IoT in any meaningful way, you start with HA.

IoT 223

The Future of P2P IoT Botnets

Trend Micro

We discuss how the involvement of P2P technology in IoT botnets can transform them into stronger threats that organizations and users need to watch out for. Research IoT Articles, News, Reports Cyber Threats

IoT 113

IoT projects demand new skills from IT project managers

Tech Republic Security

If you think regular IT project managers can run IoT projects, you might be miscalculating. Here's why

IoT 139

IoT Unravelled Part 2: IP Addresses, Network, Zigbee, Custom Firmware and Soldering

Troy Hunt

So, peeling back that next layer, the whole IoT space isn't just about devices that get their own IP address on your network and talk over TCP (or UDP). IoT and IP Addresses So, what happens when you start filling your home with IoT things?

Half a Million IoT Device Passwords Published

Schneier on Security

It's a list of easy-to-guess passwords for IoT devices on the Internet as recently as last October and November.

IoT Unravelled Part 4: Making it All Work for Humans

Troy Hunt

The first few parts of this series have all been somewhat technical in nature; part 1 was how much of a mess the IoT ecosystem is and how Home Assistant aims to unify it all, part 2 got into the networking layer with both Wi-Fi and Zigbee and in part 3 , I delved into security.

IoT 165

IoT Cybersecurity Bill Proposed to Congress

Adam Levin

Congress proposed a bill to improve the security of internet-enabled devices called the Internet of Things (IoT) Cybersecurity Improvement Act of 2019. IoT devices have long been a weak point in the cybersecurity of agencies and organizations and have also been a favorite target for hackers, despite their continuous market growth. The post IoT Cybersecurity Bill Proposed to Congress appeared first on Adam Levin. Data Security Government Cybersecurity featured Congress IoT

IoT 153

Groundbreaking IoT Legislation Close to Becoming Law

Lohrman on Security

IoT 181

IoT Malware Infections Increased by 700% Amid COVID-19 Pandemic

Heimadal Security

According to a new study on the state of IoT devices left on corporate networks during the COVID-19 pandemic, this type of devices is a major source of security compromise. The post IoT Malware Infections Increased by 700% Amid COVID-19 Pandemic appeared first on Heimdal Security Blog.

IoT 71

Securing the International IoT Supply Chain

Schneier on Security

Together with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. The basic problem we try to solve is: how to you enforce IoT security regulations when most of the stuff is made in other countries?

IoT 176

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

billion Internet of Things (IoT) devices. As more information about IoT device vulnerabilities is published, the pressure on industry and government authorities to enhance security standards might be reaching a tipping point. Implications for IoT devices.

IoT 104

Top 5 Most Powerful IoT Security Testing Tools

Appknox

However, advancement in IoT has also taken a toll on security. internet of things IoT IoT Security Security TestingThe network of interconnecting devices to exchange data popularly known as the Internet of Things is evolving rapidly in the fast-paced industry of technology.

IoT 72

New IoT Security Regulations

Schneier on Security

While the US government is largely absent in this area of consumer protection, the state of California has recently stepped in and started regulating the Internet of Things, or "IoT" devices sold in the state­and the effects will soon be felt worldwide. But it's just one of dozens of awful "security" measures commonly found in IoT devices. Once California forces minimum security standards on IoT devices, manufacturers will have to rewrite their software to comply.

IoT 161

“Best Practices for IoT Security”

Adam Shostack

There’s an interesting new draft, Best Practices for IoT Security:What Does That Even Mean? The abstract starts: “Best practices for Internet of Things (IoT) security have recently attracted considerable attention worldwide from industry and governments, while academic research has highlighted the failure of many IoT product manufacturers to follow accepted practices. It’s by Christopher Bellman and Paul C. van Oorschot.

IoT 116

ETSI Publishes IoT Testing Specs for MQTT, COAP

Trend Micro

On June 25, 2021, ETSI released its new IoT Testing Specifications completed by the organization’s committee on Methods for Testing and Specifications. Latest News IoT Articles, News, Reports Cyber Threats

IoT 79

IoT-Specific Malware Infections Jumped 700% Amid Pandemic

Dark Reading

Gafgyt and Mirai malware represented majority of IoT malware, new data from Zscaler shows

IoT 74

The Cyber Risks of Transportation’s Connected OT/IoT Systems

Security Boulevard

The post The Cyber Risks of Transportation’s Connected OT/IoT Systems appeared first on Nozomi Networks. The post The Cyber Risks of Transportation’s Connected OT/IoT Systems appeared first on Security Boulevard.

Caught on Camera: Rethinking IoT Security

Security Boulevard

The post Caught on Camera: Rethinking IoT Security appeared first on Security Boulevard. We all know that we're on camera pretty much constantly -- most coffee shops, convenience stores, and even offices employ security cameras for protection.

IoT 108

US House Passes IoT Cybersecurity Improvement Act

Security Affairs

House of Representatives passed the IoT Cybersecurity Improvement Act, a bill that aims at improving the security of IoT devices. House of Representatives last week passed the IoT Cybersecurity Improvement Act, a bill designed to improve the security of IoT devices.

IoT 80

How to Build a Resilient IoT Framework

Dark Reading

For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges

IoT 85

Lousy IoT Security

Schneier on Security

DTEN makes smart screens and whiteboards for videoconferencing systems. Forescout found that their security is terrible: In total, our researchers discovered five vulnerabilities of four different kinds: Data exposure: PDF files of shared whiteboards (e.g.

IoT 138

Six Terms to Up Your IoT Vocabulary

Security Boulevard

The Internet of Things (IoT) lexicon is constantly growing. It’s like having a conversation with a colleague who casually drops a term or acronym related to the Internet of Things (IoT) , and you suddenly find yourself on unfamiliar ground. . Things : This is the “T” in IoT.

IoT 67

Ransomware Attack Foils IoT Giant Sierra Wireless

Threatpost

The ransomware attack has impacted the IoT manufacturer's production lines across multiple sites, and other internal operations. Hacks IoT Malware