Internet of Things

How many businesses will pay a ransom if attacked?
Some 84 percent of information technology executives at firms that had not faced ransom attacks said they would never pay a ransom. But among firms that had been attacked, 43 …

Top 10 strategic technologies for government in 2016
After nearly a decade of “doing more with less,” government CIOs remain under pressure to further optimize IT and business costs while leading digital innovation …

25,000-strong CCTV botnet used for crippling DDoS attacks
A DDoS attack against a jewelry shop website has lead researchers to the discovery of a CCTV botnet comprised of some 25,000 cameras from around the globe. The website had …

IoT threats drive global embedded security shipments
With the rise of IoT, pressure to mitigate cyber risks in connected devices is mounting. Though security is a big concern, connected devices from autonomous vehicles to smart …

Unsecured security cameras lead to privacy erosion
The results of a recent analysis of some 6,000 open security cameras across the United States has shown that 15 percent of them are located in users’ private homes. Open …

Can you see and control IoT devices on your network?
While the majority of IT pros acknowledge the growing number of IoT devices on their networks, they are unaware of how to properly secure them, according to ForeScout. The …

The IoT blame game
The first Friday the thirteenth of any year is officially “Blame Someone Else Day.” What a delightful thought – that all the failures, inconsistencies, and …

Surprise! Most IoT products have inadequate security
While the IoT era of products brings innumerable advances and modern conveniences to the lives of consumers, the connected nature of these products creates unintentional ports …

IoT security testing and certification program
To help companies mitigate risks associated with an increasingly connected world, ICSA Labs, an independent division of Verizon, is rolling out a new security testing program …

Internet of Fail: How modern devices expose our lives
Should you sync your family’s calendar to your refrigerator or have it display photos? Samsung believes you should. They also think you need cameras that display the …

IoT and virtual reality: What’s next?
Smart doorbells, clever fridges, talking TVs, intelligent manufacturing, self-driving cars – all pretty cool. The IoT, in fact, is chock full of potentially very cool …

Samsung’s smart home platform flaws let attackers fiddle with your doors
Researchers have managed to exploit design flaws in the Samsung SmartThings smart home programming platform and successfully mount a series of attacks that could result in …
Featured news
Resources
Don't miss
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents
- September 2025 Patch Tuesday forecast: The CVE matrix
- Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
- CyberFlex: Flexible Pen testing as a Service with EASM