;
  1. Home
  2. IoT Security

Category: IoT Security

IoT Security
Hacker takes over 29 IoT botnets

Hacker takes over 29 IoT botnets

For the past few weeks, a threat actor who goes online by the name of “Subby” has taken over the IoT DDoS botnets of 29 other hackers, ZDNet has learned. The hacker exploited the fact…

IoT Security
6 steps to IoT disaster

6 steps to IoT disaster

So IoT is that buzzword used for prototyping, new technologies like ultra narrowband & updated machine2machine communication. There are a lot of good developments out there but there are also people, mainly consultants really comfortable…

Cyber Security News
Venafi: Five Ways Organizations Use Machine Identities

Venafi: Five Ways Organizations Use Machine Identities

On May 2, World Password Day reminds consumers to layer up their logins by enabling multifactor authentication on their devices and online accounts. Held annually on the first Thursday of May, World Password Day is a collaborative…

IoT Security
TÜV Rheinland – Industrial cybersecurity is years behind; IoT security has a standards issue

TÜV Rheinland – Industrial cybersecurity is years behind; IoT security has a standards issue

Industrial cybersecurity is years behind general IT security and standards pose a challenge for IoTcybersecurity. These are two out of eight trends identified in the TÜV Rheinland Cybersecurity Trends 2019 report. The existential question for many…

Health Care
Hacking our way into cybersecurity for medical devices

Hacking our way into cybersecurity for medical devices

Hospitals are filled with machines connected to the internet. With a combination of both wired and wireless connectivity, knowing and managing which devices are connected has become more complicated and, consequently, the institutions’ attack surface…

IoT Security
Small business cybersecurity: The case for MSSPs

Small business cybersecurity: The case for MSSPs

Smaller-sized businesses, particularly those lacking an IT staff, are targets for digital bad guys. The tech media is debating which is best for small businesses: An automated-security solution or a managed-security solution. Ben Canner, a veteran…

Financial
New Crypto-Mining Malware Targeting Asian Firms With NSA Tools

New Crypto-Mining Malware Targeting Asian Firms With NSA Tools

A new form of malware is targeting enterprises in Asia to mine monero (XMR) cryptocurrency. Cybersecurity software provider Symantec published the news in a blog post Wednesday, saying that over 80 percent of victims are located in…

IoT Security
5 outdated IT practices that companies need to eliminate

5 outdated IT practices that companies need to eliminate

Outdated Technology changes nearly as quickly as the calendar flips. A new device or upgrade that was trending not long ago may become antiquated or obsolete before you know it. Information technology is integral to…

Hacks and Breaches
Resecurity to Fully Index the Dark Web by 2020

Resecurity to Fully Index the Dark Web by 2020

According to a recent press release, “Resecurity today announced that its six-year effort to create the first comprehensive index of the dark web is on track for completion by 2020. The project, which began in stealth mode…

IoT Security
Election tech vendors say they’re securing their systems. Does anyone believe them?

Election tech vendors say they’re securing their systems. Does anyone believe them?

The last few years have been an awakening for Election Systems & Software. Before 2016, very few people were publicly pressing the company to change the way it handled its cybersecurity practices. Now, the nation’s…