article thumbnail

Verkada Surveillance Hack, Breach Highlights IoT Risks

Security Boulevard

reported a breach of customer surveillance data to the U.S. The post Verkada Surveillance Hack, Breach Highlights IoT Risks appeared first on Security Boulevard. The post Verkada Surveillance Hack, Breach Highlights IoT Risks appeared first on Security Boulevard.

article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages. Related: Companies sustain damage from IoT attacks That was back in 1982.

IoT 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

As most of us know, IoT devices are on the rise in enterprise networks. According to McKinsey & Company , the proportion of organizations that use IoT products has grown from 13 percent in 2014 to 25 percent today. The issue is that these tens of billions of new devices will likely amplify the inherent security risks of IoT.

IoT 122
article thumbnail

New IoT Security Regulations

Schneier on Security

But like nearly all innovation, there are risks involved. And for products borne out of the Internet of Things, this means the risk of having personal information stolen or devices being overtaken and controlled remotely. But it's just one of dozens of awful "security" measures commonly found in IoT devices.

IoT 227
article thumbnail

IP Cameras among IoT devices are most vulnerable to Cyber Attacks

CyberSecurity Insiders

As most of such IoT devices are seen in enterprises environments, the attack surface for such networks has reportedly increased by many fold say experts. And the risk element was calculated based on 3 factors such as behavior, configuration and functioning.

article thumbnail

Kalay cloud platform flaw exposes millions of IoT devices to hack

Security Affairs

FireEye Mandiant researchers have discovered a critical vulnerability in the Kalay cloud platform that exposes millions of IoT devices to attacks. The flaw could be easily exploited by a remote attacker to take over an IoT device, the only info needed for the attack is the Kalay unique identifier (UID) of the targeted user.

IoT 112
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.