Facebook

The Shared Security Weekly Blaze – Efail Vulnerabilities and PGP Encryption, Facebook’s App Investigation, Nest Password Notifications

This is the Shared Security Weekly Blaze for May 21, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions, Silent Pocket and CISOBox. This episode ...
Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things

Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things

Privacy, vulnerability and reliability are the three main issues almost every connected device currently on the market faces, yet consumers are still choosing to automate their homes at an incredible rate. Currently ...
Hackers Remotely Kill a Jeep on a Highway | WIRED

The 7 Craziest IoT Device Hacks

/ / Hacking, iot, security
Internet of Things (IoT) botnets have forever changed cyber-security. When an IoT botnet – which is a group of internet-connected computers, appliances or devices that have been co-opted to launch a cyber-attack ...
Matthew Pascucci

IoT and Machine Identity Protection: Getting Smarter about Securing Smart Technologies

The internet of things (IoT) is a living, breathing beast that’s surreptitiously infiltrating our lives. We now have smart cities where the street lights and trash bins are calculating data to schedule ...
Study: Attack on KrebsOnSecurity Cost IoT Device Owners $323K

Study: Attack on KrebsOnSecurity Cost IoT Device Owners $323K

A monster distributed denial-of-service attack (DDoS) against KrebsOnSecurity.com in 2016 knocked this site offline for nearly four days. The attack was executed through a network of hacked "Internet of Things" (IoT) devices ...
Hide and Seek IoT Botnet resurfaces with new tricks, persistence

Hide and Seek IoT Botnet resurfaces with new tricks, persistence

On April 30, Bitdefender researchers became aware of a new version of the Hide and Seek bot we documented earlier this year. The botnet, the world’s first to communicate via a custom-built ...
Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World

Rooting a Logitech Harmony Hub: Improving Security in Today’s IoT World

Introduction FireEye’s Mandiant Red Team recently discovered vulnerabilities present on the Logitech Harmony Hub Internet of Things (IoT) device that could potentially be exploited, resulting in root access to the device via ...
New Threat Landscape Gives Birth to New Way of Handling Cyber Security

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready for the next cyber-attack is the new normal! ...
Top 3 Takeaways from RSA 2018

Top 3 Takeaways from RSA 2018

The risky state of IoT, security ‘now mattering’ and a call to action by attendees all resonated with me at this year’s RSA Conference. The RSA Conference was back again in 2018 ...
Security Boulevard

The Internet of Everything and digital privacy: what you need to know

Statistics indicate within the next couple of years, there will be three IoT devices for every adult and child on the planet—IoT will truly be the Internet of Everything. So, should people ...
Loading...