Internet of Things
Next year, smart cities will use 1.6 billion connected things
Gartner estimates that 1.6 billion connected things will be used by smart cities in 2016, an increase of 39 percent from 2015.“Smart commercial buildings will be the …
Top IoT concerns? Data volumes and network stress
The scaling out to many thousands of devices per organization represents a wealth of new opportunities, according to a report by Quocirca. However, the same security rigor and …
How will billions of devices impact the Privacy of Things?
The Internet of Things (IoT) will create the single largest, most chaotic conversation in the history of language. Imagine every human being on the planet stepping outside and …
Millions of smartphones, IoT devices risk compromise due to 3-year-old bug
Can you believe that an estimated 6.1 million smart phones, routers, and smart TVs are vulnerable to remote code execution attacks due to security bugs that have been fixed …
Cybercriminals to target new payment technologies
The year 2015 has become widely referred to as the year of the data breach. What nefarious cyber-acts will define 2016? Raytheon|Websense cybersecurity experts today shared …
Flaws in medical data management system can be exploited to modify patient information
Two vulnerabilities found in v3.3 of Epiphany’s Cardio Server ECG Management System, a popular system that is used to centralize and manage patient data by healthcare …
Securing the smart home environment
Currently, smart home environments complement traditional home appliances with connected devices that collect, exchange and process data to create added-value services and …
Five big technology predictions into 2016
1. Security will be the biggest issue in the ICT industry driven by rapid adoption of Cloud, Mobility and the Internet of Things As platforms become more open due to the rapid …
IoT attacks and evasion techniques will characterize threats in 2016
As in years past, the Internet of Things and cloud play heavily in the predictions but new malicious tactics and strategies will create unique challenges for vendors and …
Guidelines for smart city technology adoption
Securing Smart Cities, the not-for-profit global initiative addressing the cyber security challenges of smart cities, released guidelines jointly developed by Securing Smart …
9271 crucial vulnerabilities found in 185 firmware images of embedded devices
A study into the security of the Internet of Things has confirmed that the web interfaces for user administration of commercial, off-the-shelf embedded devices – …
BadBarcode: Poisoned barcodes can be used to take over systems
Researchers from Tencent’s Xuanwu Lab have proved that a specially crafted barcode can be used to execute commands on a target system, saddle it with malware, or perform …