Internet of Things

Helping researchers with IoT firmware vulnerability discovery
John Toterhi, a security researcher with IoT security company Finite State, believes that many of the security problems plaguing IoT devices are solvable problems through …

IoT related security missteps cost enterprises millions
Enterprises have begun sustaining significant monetary losses stemming from the lack of good practices as they move forward with incorporating the IoT into their business …

USB threat vector trends and implications for industrial operators
In an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to …

Most CIOs say IoT will become a major burden
Dynatrace announced the findings of an independent global survey of 800 CIOs, which reveals that 74% of IT leaders are concerned that IoT performance problems could directly …

Bleedingbit: Critical vulnerabilities in BLE chips expose millions of access points to attack
Armis today announced the discovery of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips made by Texas Instruments (TI) and used in Cisco, Meraki and Aruba …

IoT users uncertain if personal data is shared across multiple devices
Most people (64%) say they don’t depend on their connected devices to accomplish daily activities, nearly twice as many as the 36% who indicate they depend on their …

Early adopter paradox: Consumers most excited about IoT are also most aware of privacy risks
Adoption of the Internet of Things continues to explode but it could be even more transformative, a new F-Secure survey finds. The consumers most eager to purchase new …

IoT has potential to innovate, but is it secure?
While the Internet of Things has the potential to drive the next wave of online innovation, it needs to be grounded on secure networks that prevent cyber criminals from …

Most consumers worry about cybercrime, but are not aware of what can be done about it
There is a high level of concern among consumers about the risks associated with cybercrime from their smart devices, and one in four claims to be a victim of a cyberattack. …

USA and China identified as top cyber attack sources
NSFOCUS released its H1 Cybersecurity Insights report, which analyzed traffic from January 1, 2018 to June 30, 2018. Crypto miners Since the end of March, the number of crypto …

Scaling the IoT product security lifecycle with automation
Recent events around the globe once again shine a limelight on the security issues the IoT community is facing. From claimed attacks on chlorine plants in Ukraine to potential …

Current state of IoT deployments and future expansion across enterprises
One in four Global Fortune 2000 enterprises rank Internet of Things deployment as the most important initiative in their organization yet 90% experience barriers to effective …
Featured news
Resources
Don't miss
- Cybersecurity research is getting new ethics rules, here’s what you need to know
- InterceptSuite: Open-source network traffic interception tool
- Cyber defense cannot be democratized
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents