Internet of Things
The Internet of Things is unavoidable, securing it should be a priority
The Internet of Things (IoT) started like any other buzzword: poorly defined, used too often, and generally misunderstood. However, it stood the test of time and is now …
5 ways to stop the Internet of Things from becoming the Internet of Thieves
The Internet of Things is here and is now on your wrist, in your pocket, in your car, and maybe even in your socks. From smart watches and self-driving cars to smart …
Connected cars: Are tomorrow’s drivers at risk?
The Internet of Things (IoT) aims to enhance the way we engage with devices around the home and we are now beginning to see the growth of this technology reach our driveways. …
IoT developers concerned about privacy and data protection
An impressive 65 percent of Internet of Things (IoT) apps in production today are generating real revenue. The study results, undertaken by Progress and Harbor Research, also …
IoT is full of gaping security holes, says Shodan creator
John Matherly’s Shodan, a search engine that finds Internet-connected devices, can be used for many things: gauging the impact of policies and network security efforts …
IoT devices entering enterprises, opening company networks to attacks
OpenDNS released The 2015 Internet of Things in the Enterprise Report, a worldwide data-driven security assessment of Internet of Things (IoT) devices and infrastructure found …
Solving the cybersecurity challenges of smart cities
Backed by leading IT security researchers, companies and organizations, including IOActive, Kaspersky Lab, Bastille, and the Cloud Security Alliance, the global Securing Smart …
Internet of Things: Whose data is it, anyway?
Everywhere you look, it seems to be that everything is becoming “smart”. On my wrist, I frequently wear a smart watch that monitors how many steps I take, what my heart rate …
Strengthening trust in a highly connected world
As consumers, we increasingly expect anytime-anywhere access and personalized service, whether online at home, on-the-go with mobile devices, or in a store or branch location. …
Flawed crypto endangers millions of smart grid devices
The cryptography used in the Open Smart Grid Protocol (OSGP), one of the most widely used smart meter and smart grid device networking standards, can be easily cracked, …
IoT and the great data heist
The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction …
Securing the smart grid: European Network of Cyber Security
Dr. Klaus Kursawe is the Chief Scientist at the European Network of Cyber Security (ENCS), where he is leading the research and development activities for critical …
Featured news
Sponsored
Don't miss
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity
- 25 cybersecurity AI stats you should know
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)