IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. Are these examples actually risks in IoT? IoT firmware should be self-healing. IoT Security

IoT 279

Appknox adds ioXT Security Compliance Testing for IoT & Mobile Apps

Appknox

Appknox, a leading enterprise mobile application security solution provider has announced a partnership with ioX t , a global standard for IoT security and standardization of security, privacy, and compliance programs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Top IoT Security Solutions of 2021

eSecurity Planet

IoT security is where endpoint detection and response ( EDR ) and enterprise mobility management ( EMM ) meet the challenges of a rapidly expanding edge computing infrastructure. By year-end, total IoT device installations will surpass 35 billion and extend to 55 billion by 2025.

IoT 96

Attacks Escalating Against Linux-Based IoT Devices

eSecurity Planet

Incidents of malware targeting Linux-based Internet of Things (IoT) devices jumped by more than a third in 2021, with three malware families the primary drivers behind the increase. Threats to Open Source, IoT. Also read: Top IoT Security Solutions for 2022. IoT Protection Steps.

IoT 102

ISO/IEC 27400 IoT security and privacy standard published

Notice Bored

To celebrate the publication of ISO/IEC 27400:2022 today, we have slashed the price for our IoT security policy templates to just $10 each through SecAware.com. Do you have a security policy on IoT? If not, does that mean IoT is out of control in your organisation?

IoT 80

Malvertising Campaign Targets IoT Devices: GeoEdge

eSecurity Planet

A malicious advertising campaign originating out of Eastern Europe and operating since at least mid-June is targeting Internet of Things (IoT) devices connected to home networks, according to executives with GeoEdge, which offers ad security and quality solutions to online and mobile advertisers.

IoT 113

DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile

Dark Reading

Attackers are capitalizing on the rise of misconfigured Internet-connected devices running the WS-Discovery protocol, and mobile carriers are hosting distributed denial-of-service weapons

DDOS 88

5 Things CISOs Need To Know About IoT Security

Appknox

The growth of the Internet and the increase in the adoption of devices has brought a new set of security challenges for enterprises - IoT security. CIO CISO enterprise IoT mobile security security IoT Security

CISO 56

Can Nanotech Secure IoT Devices From the Inside-Out?

Threatpost

Work's being done with uber-lightweight nanoagents on every IoT device to stop malicious behavior, such as a scourge of botnet attacks, among other threats. IoT Malware Mobile Security RSAC Vulnerabilities

IoT 108

IoT Device Takeovers Surge 100 Percent in 2020

Threatpost

The COVID-19 pandemic, coupled with an explosion in the number of connected devices, have led to a swelling in IoT infections observed on wireless networks.

IoT 113

Mobile Security Company Zimperium acquires WhiteCryption

CyberSecurity Insiders

Zimperium, a globally recognized mobile security firm has made it official that it is going to acquire application security company whiteCryption for an undisclosed amount. Thus, the Mobile Security pioneer will generate enterprise security apps that are resistant to attacks.

Mobile 113

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. has made some strides on IoT security at the federal level; it remains to be seen if the EU initiative will spur the U.S.

Best Enterprise Mobility Management (EMM) Solutions for 2022

eSecurity Planet

Managing mobile apps and devices is a challenge faced by all organizations these days. One technology that’s evolved to address mobile security, access management , and control is enterprise mobility management (EMM). 8 Top Enterprise Mobility Management Solutions.

How Cloud Native Technology will Impact 5G Mobile Networks

Security Boulevard

The post How Cloud Native Technology will Impact 5G Mobile Networks appeared first on Radware Blog. The post How Cloud Native Technology will Impact 5G Mobile Networks appeared first on Security Boulevard. CSPs understand today that they need more from cloud.

Bluetooth Spoofing Bug Affects Billions of IoT Devices

Threatpost

Critical Infrastructure IoT Mobile Security Vulnerabilities Android apple BLESA Bluetooth Bluetooth Low Energy BlueZ CVE-2020-9770 google ios IoT devices Linux pairing Purdue University Spoofing unpatched

IoT 112

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders. He found that 39 percent of the vulnerable IoT things were in China; another 19 percent are located in Europe; seven percent of them are in use in the United States. If the code stamped on your IoT device begins with one of these, it is vulnerable.

IoT 207

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

billion Internet of Things (IoT) devices. As more information about IoT device vulnerabilities is published, the pressure on industry and government authorities to enhance security standards might be reaching a tipping point. Implications for IoT devices.

IoT 111

5G Security Vulnerabilities Fluster Mobile Operators

Threatpost

A survey from GSMA and Trend Micro shows a concerning lack of security capabilities for private 5G networks (think factories, smart cities, industrial IoT, utilities and more). Cloud Security Critical Infrastructure Mobile Security

The Edge is Becoming More Critical in a World of 5G and IoT

Security Boulevard

The edge is becoming more critical in a world of 5G and IoT. I've seen the evolution from 1x to 3G to 4G and now 5G over the many years I've worked in the mobile space, and 5G and IoT will drive the biggest changes we have seen on the edge in 10 or 20 years.

IoT 71

Unlocking the true potential of IoT with 5G

CyberSecurity Insiders

By 2025, it will account for 21% of the world’s mobile connections – and has the power to truly unlock the potential of the Internet of Things (IoT), connecting billions of objects. Forecasts suggest there could be as many as 75 billion IoT connected devices by 2025.

IoT 112

IoT and Machine Identity Management in Financial Services

Security Boulevard

IoT and Machine Identity Management in Financial Services. How is IoT changing the financial sector? IoT has already positively impacted the financial sector and will only continue to in the future. With IoT, data can be gathered in real-time.

Top Mobile Security Stories of 2019

Threatpost

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost's Top 10 mobile security stories of 2019.

Unfixed vulnerability in popular library puts IoT products at risk

Malwarebytes

Researchers have found a vulnerability in a popular C standard library in IoT products that could allow attackers to perform DNS poisoning attacks against a target device. The post Unfixed vulnerability in popular library puts IoT products at risk appeared first on Malwarebytes Labs.

IoT 97

Free PDF download: Cybersecurity in an IoT and mobile world

Tech Republic Security

This special report from ZDNet and TechRepublic examines the evolving landscape of cybersecurity as mobile and IoT become indispensable tools in the enterprise. Download it as a free PDF ebook

Mobile 103

IT threat evolution in Q1 2022. Non-mobile statistics

SecureList

Non-mobile statistics. Mobile statistics. IoT attacks. IoT threat statistics. TOP 10 threats delivered to IoT devices via Telnet. Similar IoT-threat statistics are published in the DDoS report for Q1 2022. IT threat evolution in Q1 2022.

How Will 5G Technology Alter IoT Security And How Can We Prepare?

CyberSecurity Insiders

As an increasing number of companies plan to implement 5G mobile networks on a large scale, organizations need to consider the security risks that the technology can pose. The post How Will 5G Technology Alter IoT Security And How Can We Prepare? Mobile

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages.

IoT 210

70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs

Threatpost

IoT Mobile Security Most Recent ThreatLists Vulnerabilities app security Bugs code reuse Libraries Open Source percentage of apps Security Vulnerabilities the report VeracodeA lack of awareness about where and how open-source libraries are being used is problematic, researchers say.

Mobile 100

Why Healthcare IoT Requires Strong Machine Identity Management

Security Boulevard

Why Healthcare IoT Requires Strong Machine Identity Management. The healthcare industry has been leveraging IoT devices for years, steadily increasing its use in facilities and patient care. How to secure healthcare IoT.

MY TAKE: Can embedding security deep inside mobile apps point the way to securing IoT?

The Last Watchdog

Mobile 109

Does Home IoT Compromise Enterprise Security?

Trend Micro

The most recent Pwn2Own (Fall 2021 Pwn2Own Austin) includes more IoT entries than ever. This gives us an opportunity to probe today’s largest and newest enterprise attack surface: the home office.

IoT 76

GUEST ESSAY: Lessons learned in 2021 as cloud services, mobility and cybersecurity collided

The Last Watchdog

The acceleration of cloud, mobility, and security initiatives proved to be critical for organizations looking to weather the new threats and disruptions. Securing Iot, MEC. However, these advancements open the door to new potential threats and vulnerabilities such as kernel bypass, DDOS attacks on 5G service interfaces, cyberattacks on the Internet-of-Things (IoT) ecosystem, leading to Zero-day exploits, software tampering and API exploits.

Mobile 147

A New Standard for Mobile App Security

Google Security

According to eMarketer , in 2020 users spent over three and a half hours per day using mobile apps. With so much time spent on mobile devices, ensuring the safety of mobile apps is more important than ever.

Mobile 104

5G and IoT: How to Approach the Security Implications

Threatpost

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included). Featured IoT Malware Mobile Security Vulnerabilities Webinars 5G 5g use cases attack vectors automotive recalls Cybersecurity DDoS iboss indutrial ioT Internet of things IoT Device Mirai network perimeter network slicing new cyber concerns Nokia remote surgery rollouts sectigo self-driving cars

IoT 68

‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth

Security Boulevard

Tesla cars can be unlocked and stolen via a simple relay attack. The company shrugged and said it’s “a known limitation.”. The post ‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth appeared first on Security Boulevard.

Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats

Threatpost

Experts from Gartner, Lookout and Google talk enterprise mobile security in this webinar replay. IoT Malware Mobile Security Privacy Videos Vulnerabilities Webinars Android david richardson EMM enterprise mobile enterprise mobility management gartner google ios Lookout MDM mike burr mobile Mobile device management mobile vpn patrick hevesi post-perimeter security webinar replay

What Would It Look Like If We Put Warnings on IoT Devices Like We Do Cigarette Packets?

Troy Hunt

Part of this data was collected via an IoT device called the InnoTab which is a wifi connected tablet designed for young kids; think Fisher Price designing an iPad. As it turns out, we know exactly how to put warnings on dangerous products down here in Australia because we've been doing it for years with cigarettes : So how would warning labels on IoT devices that have had serious security vulnerabilities look? Security IoT

IoT 219

JekyllBot:5 flaws allow hacking TUG autonomous mobile robots in hospitals

Security Affairs

Researchers discovered five vulnerabilities that can be exploited to remotely hack hospital Aethon’s TUG autonomous mobile robots. A TUG is an autonomous mobile robot designed for hospitals by Aethon. SecurityAffairs – hacking, TUG autonomous mobile robots).

New Aruba Mobile First Platform could boost IoT security, improve UX

Tech Republic Security

HPE's Aruba released a new platform that leverages APIs to provide better insights about mobile and IoT infrastructure

Thales joins Google’s 5G Mobile Edge Cloud initiative

CyberSecurity Insiders

In March 2020, Google Cloud unveiled its telecom operator strategy called Global Mobile Edge Cloud (GMEC), aimed at helping Communications Service Providers (CSPs) digitally transform and harness the full potential of 5G. What is Google’s 5G Mobile Edge Cloud initiative?

IoT Security Challenges in a 5G Era: Expert Advice

Threatpost

Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar replay. IoT Mobile Security Webinars 5G 5g attributes botnet cyber attacks enterprise applications expert advice Internet of things mobile networks remote surgery security concerns self-driving cars

IoT 65

AI, the Mandatory Element of 5G Mobile Security

Threatpost

Cloud Security Critical Infrastructure Featured IoT Mobile Security 5G 5g networks artificial intelligence gsma mobile 360 security for 5G conference Security security solutions telecom networks virtualizationThe complexity and scale of the 5G ecosystem, combined with a lack of skills and training in software-centric security, will be important drivers for AI deployment in the carrier space.

Apple Failed—AirTag has a HUGE Stalking Problem

Security Boulevard

One year on, the Apple AirTag product has proved the dire predictions correct: They’re being used to “stalk and harass women.”. The post Apple Failed—AirTag has a HUGE Stalking Problem appeared first on Security Boulevard.