IoT and ICS Security

IOT and ICS Security

The Black Swan: Mitigating Cyber Attacks Within ICS Environments

The Black Swan: Mitigating Cyber Attacks Within ICS Environments

/
ICSs are specialized resulting in limited industry expertise spanning ICS, IT, and security. In terms of mitigation techniques, most vendors and organizations leverage generic security methodologies resulting in a reactive approach. RSA ...
New EU Privacy Law May Weaken Security

New EU Privacy Law May Weaken Security

/
Companies around the globe are scrambling to comply with new European privacy regulations that take effect a little more than three months from now. But many security experts are worried that the ...
DoubleDoor IoT Botnet Abuses Two Vulnerabilities to Circumvent Firewalls, Modems

DoubleDoor IoT Botnet Abuses Two Vulnerabilities to Circumvent Firewalls, Modems

/
The DoubleDoor Internet of Things (IoT) botnet circumvents firewall protection and other security measures by abusing two vulnerabilities. Detected by NewSky Security in its honeypot logs, DoubleDoor begins by deploying CVE-2015-7755. The ...
Is My Smart Home Telling People What I Do Every Day?

Is My Smart Home Telling People What I Do Every Day?

/
2017 will forever be known as the year that the smart home started to take off. Researchers estimate that Amazon has sold over 15 million Echo devices to date. Plus, Google has ...

How to Prevent Attacks on These 7 Most Vulnerable Connected Toys

/
What’s the next toy you are going to give to your child? Maybe, you are thinking about a voice-activated plush bear that can speak some clever lines and “engage” your child? That ...

Water Utility Infected by Cryptocurrency Mining Software

/
A water utility in Europe has been infected by cryptocurrency mining software. This is a relatively new attack: hackers compromise computers and force them to mine cryptocurrency for them. This is the ...
What Does a Windstorm in Wyoming Have to Do with Cyber Security?

What Does a Windstorm in Wyoming Have to Do with Cyber Security?

/
Natural disasters serve as excellent examples of the unforeseen consequences that a cyber-attack against infrastructure will have. Take for example a strong windstorm in Wyoming in February 2017. The storm knocked down ...
Adobe Confirms Unpatched Flash Player Vulnerability Used in Attacks

Adobe Confirms Unpatched Flash Player Vulnerability Used in Attacks

/
Adobe Systems has confirmed that attackers are in possession of an exploit for a critical zero-day vulnerability in Flash Player that will be patched over the coming days. News of the flaw ...
The Looming Enterprise IoT Security Threat

The Looming Enterprise IoT Security Threat

/
Distributed denial-of-service (DDoS) botnets are not the only threat organizations need to worry about when it comes to the internet of things (IoT). The Mirai attacks of 2016 engendered a pretty broad ...
Hardware Security Is Best for Securing Healthcare, Finance IoT

Hardware Security Is Best for Securing Healthcare, Finance IoT

/
Over the past year, we’ve seen a wave of high-profile cyberattacks, and all companies should be concerned. These attacks haven’t been limited to any one industry, but range from credit scores (Equifax) ...
Loading...