IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. Are these examples actually risks in IoT? IoT firmware should be self-healing. IoT Security

IoT 243

Understanding Global IoT Security Regulations

Security Boulevard

The IoT is maturing rapidly, and surveys show that global IoT spending will achieve a combined annual growth rate (CAGR) of 11.3% The huge potential of IoT. The post Understanding Global IoT Security Regulations appeared first on Security Boulevard.

IoT 99
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hacked IoT Devices Livestreaming Swatting Attacks: FBI

Adam Levin

The post Hacked IoT Devices Livestreaming Swatting Attacks: FBI appeared first on Adam Levin. Data Security Technology featured hacking IoT swatHackers are using internet-connected home devices to livestream “swatting” attacks, according to the FBI.

IoT 249

IoT Security Principles

Schneier on Security

They call for: Distinguishing between consumer and industrial IoT. And if you need more security and privacy principles for the IoT, here's a list of over twenty. The BSA -- also known as the Software Alliance, formerly the Business Software Alliance -- is an industry lobbying group.

IoT 213

Analyzing IoT Security Best Practices

Schneier on Security

New research: " Best Practices for IoT Security: What Does That Even Mean? " We consider categories of best practices, and how they apply over the lifecycle of IoT devices. by Christopher Bellman and Paul C.

IoT 258

Overcoming IoT Asset Management Challenges

Security Boulevard

With the number of IoT devices expected to reach 55.7 The post Overcoming IoT Asset Management Challenges appeared first on Security Boulevard.

IoT 106

Hacking IoT Security with Aaron Guzman

Security Boulevard

Sources and Sinks interviews car hacker and IoT security expert, Aaron Guzman. As our devices become increasingly interconnected too, we have to start thinking about the security of our IoT devices. The post Hacking IoT Security with Aaron Guzman appeared first on Security Boulevard.

IoT 87

IoT Devices Built to Meet Cybersecurity Needs

Security Boulevard

The Internet of Things (IoT) includes items such as smart appliances, smartwatches, and medical sensors. IoT devices often lack built-in security controls, a situation which creates […]… Read More.

IoT 65

IoT Unravelled Part 5: Practical Use Case Videos

Troy Hunt

This is the fifth and final part of the IoT unravelled blog series. Part 1 was all about what a mess the IoT landscape is, but then there's Home Assistant to unify it all. Opening the Garage Door Remotely The original goal of this whole IoT journey!

IoT 235

Cyber Threats Haunting IoT Devices in 2021

Security Boulevard

With new technological advancements coming to light every day, the supply and demand for IoT devices has increased significantly. The post Cyber Threats Haunting IoT Devices in 2021 appeared first on Kratikal Blogs.

Malvertising Campaign Targets IoT Devices: GeoEdge

eSecurity Planet

A malicious advertising campaign originating out of Eastern Europe and operating since at least mid-June is targeting Internet of Things (IoT) devices connected to home networks, according to executives with GeoEdge, which offers ad security and quality solutions to online and mobile advertisers.

IoT 114

New Report: Ransomware, Vulnerabilities and IoT Security Threats

Security Boulevard

Nozomi Networks Labs has produced a new OT/IoT security report. Don’t miss this summary of vulnerability trends as well as important information about ransomware and IoT security camera threats.

IoT 97

KrebsOnSecurity Hit By Huge New IoT Botnet “Meris”

Krebs on Security

The assault came from “ Meris ,” the same new “Internet of Things” (IoT) botnet behind record-shattering attacks against Russian search giant Yandex this week and internet infrastructure firm Cloudflare earlier this summer.

IoT 198

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

During a two-week period in December 2020, Zscaler analyzed more than 575 million device transactions and blocked more than 300,000 malware attacks aimed at IoT devices, a 700 percent increase over pre-pandemic numbers. Cloud IoT security remote workforce security

IoT 113

Industrial IoT Needs to Catch Up to Consumer IoT

Security Boulevard

The post Industrial IoT Needs to Catch Up to Consumer IoT appeared first on The State of Security. The post Industrial IoT Needs to Catch Up to Consumer IoT appeared first on Security Boulevard. IoT & ICS Security Security Bloggers Network ICS Security IIoT iot

IoT 76

Cataloging IoT Vulnerabilities

Schneier on Security

Recent articles about IoT vulnerabilities describe hacking of construction cranes , supermarket freezers , and electric scooters. hacking internetofthings vulnerabilities

IoT 164

IoT Attacks Skyrocket, Doubling in 6 Months

Threatpost

IoT Most Recent ThreatListsThe first half of 2021 saw 1.5 billion attacks on smart devices, with attackers looking to steal data, mine cryptocurrency or build botnets.

IoT 111

Half a Million IoT Passwords Leaked

Schneier on Security

We have a long way to go to secure the IoT. It is amazing that this sort of thing can still happen: the list was compiled by scanning the entire internet for devices that were exposing their Telnet port.

Securing the International IoT Supply Chain

Schneier on Security

Together with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. The basic problem we try to solve is: how to you enforce IoT security regulations when most of the stuff is made in other countries?

IoT 240

IoT Unravelled Part 4: Making it All Work for Humans

Troy Hunt

The first few parts of this series have all been somewhat technical in nature; part 1 was how much of a mess the IoT ecosystem is and how Home Assistant aims to unify it all, part 2 got into the networking layer with both Wi-Fi and Zigbee and in part 3 , I delved into security.

IoT 213

Half a Million IoT Device Passwords Published

Schneier on Security

It's a list of easy-to-guess passwords for IoT devices on the Internet as recently as last October and November.

New Charges, Sentencing in Satori IoT Botnet Conspiracy

Krebs on Security

Justice Department today criminally charged a Canadian and a Northern Ireland man for allegedly conspiring to build botnets that enslaved hundreds of thousands of routers and other Internet of Things (IoT) devices for use in large-scale distributed denial-of-service (DDoS) attacks. The U.S.

IoT 215

IoT Security & Threat Modeling

Adam Shostack

There’s a new report out from the UK Government, The UK Code of Practice for Consumer IoT Security. One of the elements I want to draw attention to is: The use of IoT devices by perpetrators of domestic abuse is a pressing and deeply concerning problem that is largely hidden from view. Collecting data (and therefore evidence) on this is challenging for a number of reasons outlined in this section by Leonie Tanczer.

IoT 100

Podcast: IoT Piranhas Are Swarming Industrial Controls

Threatpost

Enormous botnets of IoT devices are going after decades-old legacy systems that are rife in systems that control crucial infrastructure. Critical Infrastructure IoT Malware Podcasts Vulnerabilities Web Security

IoT 114

100M IoT Devices Exposed By Zero-Day Bug

Threatpost

Cloud Security IoT VulnerabilitiesA high-severity vulnerability could cause system crashes, knocking out sensors, medical equipment and more.

IoT 109

Verkada Surveillance Hack, Breach Highlights IoT Risks

Security Boulevard

The post Verkada Surveillance Hack, Breach Highlights IoT Risks appeared first on Security Boulevard. Cloud Security Featured IoT & ICS Security News Security Boulevard (Original) Breach IoT Security surveillance VerkadaBuilding security vendor Verkada Inc.

TalkingTrust with Thales: IoT Security with Keyfactor

Security Boulevard

This blog recaps TalkingTrust with Thales, an interview between Ellen Boehm, VP of IoT Strategy and Solutions at Keyfactor, and Dave Madden, Senior Director of Business Development at Thales. . The post TalkingTrust with Thales: IoT Security with Keyfactor appeared first on Security Boulevard.

IoT 82

IoT Unravelled Part 1: It's a Mess. But Then There's Home Assistant

Troy Hunt

With the benefit of hindsight, this was a naïve question: Alright clever IoT folks, I've got two of these garage door openers, what do you reckon the best way of connecting them with Apple HomeKit is? If you're going to do IoT in any meaningful way, you start with HA.

IoT 254

Your IoT devices may be vulnerable to malware

Tech Republic Security

NordPass: Only 33% of users surveyed had changed the default passwords on their IoT devices, leaving the rest vulnerable to attack

IoT 162

Defending Against IoT Security Camera Hacks Like Verkada

Security Boulevard

The post Defending Against IoT Security Camera Hacks Like Verkada appeared first on Nozomi Networks. The post Defending Against IoT Security Camera Hacks Like Verkada appeared first on Security Boulevard.

IoT 83

US House Passes IoT Cybersecurity Improvement Act

Security Affairs

House of Representatives passed the IoT Cybersecurity Improvement Act, a bill that aims at improving the security of IoT devices. House of Representatives last week passed the IoT Cybersecurity Improvement Act, a bill designed to improve the security of IoT devices.

IoT 110

IoT Security Checklist

Security Boulevard

Internet-connected devices, collectively known as the Internet of Things or IoT, can provide opportunities for attackers to access your network–and as a result, devices more sensitive than your lightbulbs. The post IoT Security Checklist appeared first on Hurricane Labs.

IoT 81

Ransomware Attack Foils IoT Giant Sierra Wireless

Threatpost

The ransomware attack has impacted the IoT manufacturer's production lines across multiple sites, and other internal operations. Hacks IoT Malware

New IoT Security Regulations

Schneier on Security

While the US government is largely absent in this area of consumer protection, the state of California has recently stepped in and started regulating the Internet of Things, or "IoT" devices sold in the state­and the effects will soon be felt worldwide. But it's just one of dozens of awful "security" measures commonly found in IoT devices. Once California forces minimum security standards on IoT devices, manufacturers will have to rewrite their software to comply.

IoT 194

IoT Unravelled Part 2: IP Addresses, Network, Zigbee, Custom Firmware and Soldering

Troy Hunt

So, peeling back that next layer, the whole IoT space isn't just about devices that get their own IP address on your network and talk over TCP (or UDP). IoT and IP Addresses So, what happens when you start filling your home with IoT things?

In the World of IoT Security, Lock Every Door

Security Boulevard

The post In the World of IoT Security, Lock Every Door appeared first on Security Boulevard. Cybersecurity Security Boulevard (Original) Spotlight data and network security Internet of things iot IoT Security

IoT 104

The Cyber Risks of Transportation’s Connected OT/IoT Systems

Security Boulevard

The post The Cyber Risks of Transportation’s Connected OT/IoT Systems appeared first on Nozomi Networks. The post The Cyber Risks of Transportation’s Connected OT/IoT Systems appeared first on Security Boulevard.

Lousy IoT Security

Schneier on Security

DTEN makes smart screens and whiteboards for videoconferencing systems. Forescout found that their security is terrible: In total, our researchers discovered five vulnerabilities of four different kinds: Data exposure: PDF files of shared whiteboards (e.g.

IoT 170

Why your IoT devices may be vulnerable to malware

Tech Republic Security

Only 33% of users surveyed by NordPass changed the default passwords on their IoT devices, leaving the rest susceptible to attack

IoT 158

Smashing Security podcast #245: The Julian Assange assassination plot, and IoT toilets

Graham Cluley

While Julian Assange was killing time in the Ecuador's embassy in London, the CIA were trying to dream up ways to kill him, and urine trouble if you put your trust in an IoT lavatory.

IoT 89

New IoT Legislation Means Advance Planning is Key

Security Boulevard

As 2020 wound to a close, the year’s end marked a major milestone in strengthening the security of Internet of Things (IoT) devices and systems. The post New IoT Legislation Means Advance Planning is Key appeared first on Security Boulevard.

IoT 94

IoT projects demand new skills from IT project managers

Tech Republic Security

If you think regular IT project managers can run IoT projects, you might be miscalculating. Here's why

IoT 169

The Future of P2P IoT Botnets

Trend Micro

We discuss how the involvement of P2P technology in IoT botnets can transform them into stronger threats that organizations and users need to watch out for. Research IoT Articles, News, Reports Cyber Threats

IoT 113