Internet of Things

By 2018, 25 percent of new mobile apps will talk to IoT devices
With the convergence of devices, bots, things and people, organizations will need to master two dimensions of mobility, according to Gartner. CIOs and IT leaders will need to …

IoT-based DDoS attacks on the rise
Cybercriminal networks are increasingly taking advantage of lax Internet of Things device security to spread malware and create zombie networks, or botnets, unbeknownst to …

Public safety threat: Cyber attacks targeting smart city services
A new survey conducted by Dimensional Research assessed cyber security challenges associated with smart city technologies. Survey respondents included over 200 IT …

Fresh Bluetooth Developer Toolkit line tackles IoT security, interoperability
The Bluetooth Special Interest Group (SIG) released several updates to its developer toolkit line-up, which enables developers to build smarter when creating things like …

Cloud going mainstream, few are maximizing value
While cloud adoption continues to accelerate, few organizations are maximizing the value that cloud can offer, according to IDC. The increased cloud adoption is being fueled …

Connected devices riddled with badly-coded APIs, poor encryption
The advent of home automation and rapid rise of smart home connected devices is seeing some vendors and new startups scramble to become a part of the movement, with ABI …

IoT Village uncovers 47 security vulnerabilities across 23 devices
New dangers in both home security and municipal power facilities were revealed as the results of the 2nd Annual IoT Village, held at DEF CON 24 in Las Vegas. More than 47 new …

68% of organizations don’t have an IoT test strategy
Capgemini and HPE examined the state of application quality and testing practices across multiple industries and 32 countries. They discovered that, despite 85% claiming that …

Organization must modify the network access policy to address IoT devices
By 2020, 21 billion of Internet of Things (IoT) devices will be in use worldwide. Of these, close to 6 percent will be in use for industrial IoT applications. However, IT …

Are all IoT vulnerabilities easily avoidable?
Every vulnerability or privacy issue reported for consumer connected home and wearable technology products since November 2015 could have been easily avoided, according to the …

Mirai Linux Trojan corrals IoT devices into DDoS botnets
Mirai, a newly discovered and still poorly detected piece of Linux malware, is being used to rope IoT devices into DDoS botnets. Researchers from MalwareMustDie have recently …

How a security researcher is tackling IoT security testing
“A common misconception people in the industry have regarding my work as a security researcher is that I am sharing information that puts businesses at risk. And also, …
Featured news
Resources
Don't miss
- AWS CISO explains how cloud-native security scales with your business
- Product showcase: Apricorn Aegis NVX, a high-security, portable SSD
- How to build and grow a scalable vCISO practice as an MSP
- Global OT cyber risk could top $329 billion, new report warns
- Netscaler vulnerability was exploited as zero-day for nearly two months (CVE-2025-6543)