Internet of Things

US senators introduce bill to improve IoT security, protect researchers probing it
US Senators Mark Warner (D-VA), Cory Gardner (R-CO), Ron Wyden (D-WA) and Steve Daines (R-MT) introduced bipartisan legislation to improve the cybersecurity of …

How enterprise IT security conversations have changed
Deutsche Telecom is one of the world’s largest telecom companies, and its corporate IT and cyber security arm T-Systems is one of the largest European IT services …

Hackers can turn Amazon Echo into a covert listening device
New research released by MWR InfoSecurity reveals how attackers can compromise the Amazon Echo and turn it into a covert listening device, without affecting its overall …

Digital transformation and IoT to drive investment in IT operations management
The growth of digital business and the Internet of Things (IoT) is expected to drive large investment in IT operations management (ITOM) through 2020, according to Gartner. A …

Hackable smart car wash systems can hurt people
Two years after researchers Billi Rios and Terry McCorkle first flagged serious vulnerabilities in automatic, smart car wash systems by US manufacturer PDQ, the company is …

An Internet-connected fish tank let hackers into a casino’s network
A high-tech, internet-connected fish tank in a North American casino has been used to exfiltrate data from the company’s network. Smart drawing pads used in an …

90% of consumers think security should be built into smart devices
90% of consumers polled from Brazil, China, Germany, India, UK and US believe it is important that a connected device has security built into the product, digital platform …

Testing the security of connected cars and IoT devices
IBM Security announced the launch of two new security testing practice areas focused on automotive security and the Internet of Things (IoT). The new services will be …

Destruction of Service attacks could shut down organizations for good
The Cisco 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential Destruction of …

How healthcare IT decision makers approach IoT security
More than 90% of healthcare IT networks have IoT devices connected to them. Over 70% of IT departments believe that the traditional security solutions used to secure laptops …

Exploitable gSOAP flaw exposes thousands of IoT devices to attack
Researchers have unearthed a serious vulnerability in gSOAP, an open source, third-party code library used by thousands of IoT by many different manufacturers. Senrio Labs …

Many businesses spend more than $100,000 annually on additional cloud security features
Businesses prefer storing data in the cloud but plan to invest in extra security precautions, according to B2B ratings and reviews firm Clutch. Nearly 70% of businesses on the …
Featured news
Resources
Don't miss
- Deepfakes are rewriting the rules of geopolitics
- Garak: Open-source LLM vulnerability scanner
- Fixing silent failures in security controls with adversarial exposure validation
- Plex tells users to change passwords due to data breach, pushes server owners to upgrade
- Fake npm 2FA reset email led to compromise of popular code packages