Keynoters from Cisco, Netflix and RSA highlighted lessons from the last year, and cybersecurity’s new mandate in the post-pandemic world: Bounce back stronger.Read More What a Year It’s Been: RSA 2021 Embraces ‘Resilience’
Pandemic and evolving IT demands are having a major, negative impact on CISO’s mental health, a survey found.Read More CISOs Struggle to Cope with Mounting Job Stress
Hey, that’s not my kitchen! Those aren’t my kids! And that dreadful wallpaper’s certainly not mine!Read More “Those aren’t my kids!” – Eufy camera owners report video mixups
The ‘Send My’ exploit can use Apple’s locator service to collect and send information from nearby devices for later upload to iCloud servers.Read More Apple’s ‘Find My’ Network Exploited via Bluetooth
Wi-Fi devices going back to 1997 are vulnerable to attackers who can steal your data if they’re in range.Read More ‘FragAttacks’: Wi-Fi Bugs Affect Millions of Devices
Aamir Lakhani, researcher at FortiGuard Labs, discusses leading-edge threats related to edge access/browsers/IoT, and the COVID-19 vaccine, as a way of getting into larger organizations.Read More Shifting Threats in a Changed World: Edge, IoT and Vaccine Fraud
Millions of smart TVs in China may have collected data without the knowledge of viewers about Wi-Fi networks found within range and attached devices.
Read more in my article on the Bitdefender BOX blog.Read More Chinese smart TVs caught hoovering up data about devices on customers’ networks
A rapid proliferation of IoT has opened unsupervised doors to cybercriminals. How can we apply the principles of Zero Trust to address this challenge?
The post How to apply a Zero Trust approach to your IoT solutions appeared first on Microsoft Security.Read More How to apply a Zero Trust approach to your IoT solutions
It was 1977, and soon-to-be-fans were greeted with a masterful score and scrolling text. Darth Vader and Princess Leia share the screen in those opening moments, and the Star Wars universe was created. Nearly 30 years later, a new film would introduce …Read More The Death Star’s Demise: Can You Trust Your IoT Vendors?
Call comes after Microsoft discovers vulnerabilities in devices on industrial, medical, and enterprise networksRead More Infosec pros urged to patch IoT and OT devices
Azure Defender security team discovers that memory allocation is a systemic problem that can allow threat actors to execute malicious code remotely or cause entire systems to crash.Read More Microsoft Warns 25 Critical Vulnerabilities in IoT, Industrial Devices
Lane Thames, PhD and principal security researcher at Tripwire explains the challenges you might not have considered in IT/OT convergence. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripw…Read More Industrial Security: Not Just IT and OT, but Old OT and New OT
Latest episode – listen now!Read More S3 Ep29: Anti-tracking, rowhammer problems and IoT vulns [Podcast]
Daycare camera product NurseryCam was hacked last week, the company was forced to shut down its IoT camera service. On Friday, The Register become aware of the compromise of the NurseryCam network. NurseryCam is produced by the companies FootfallCam Ltd and Meta Technologies Ltd. In response to the incident, the company shut down its IoT […]
The post NurseryCam daycare cam service shut down after security breach appeared first on Security Affairs.Read More NurseryCam daycare cam service shut down after security breach
Learn how Microsoft ensures operational resilience for Azure datacenters with Azure Defender for IOT and Azure Sentinel
The post Securing Azure datacenters with continuous IoT/OT monitoring appeared first on Microsoft Security.Read More Securing Azure datacenters with continuous IoT/OT monitoring
Hundreds of thousands of individuals are potentially affected by this vulnerability.Read More Misconfigured Baby Monitors Allow Unauthorized Viewing
As I progressively make my house smarter and smarter, I find I keep butting against the intersection of where smart stuff meets dump stuff. Take light globes, for example, the simplest circuit you can imagine. Pass a current through it, light goes on. Kill the current, light goes off. WeRead More Controlling Smart Lights Using Dumb Switches with Shelly and Home Assistant
A researcher has uncovered disturbing security holes in a widely-used CCTV service designed to let parents remotely watch their children playing at nursery.
Read more in my article on the Bitdefender BOX blog.Read More NurseryCam has serious security issues, claims researcher
Linux and Unix operating systems require regular patching like any IT system, but as security professionals, ethical hackers, and criminal hackers will tell you, regular Linux and Unix patching is often neglected.CVE-2021-3156 sudo VulnerabilityLast we…Read More The Linux Flaw you can’t afford to Ignore (CVE-2021-3156)
Anyone buying a home security camera is probably buying it with the intention of increasing their security, not decreasing it.
And yet once again an internet-enabled CCTV camera has proven itself to be vulnerable to attack, allowing Peeping Toms to …Read More Hackers could live-stream your home through your LifeShield security camera
A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, November 2020.Manchester United FC remains impacted by a seemly major cyber-attack, which I covered in a …Read More Cyber Security Roundup for December 2020
What. A. Week. Blog post every day, massive uptick in comments, DMs, newsletter subscribers, followers and especially, blog traffic. More than 200,000 unique visitors dropped by this week, mostly to read about IoT things. This has been a fascinating experience for me and I’ve enjoyed sharing the journey, completeRead More Weekly Update 219: IoT Unravelled with Scott Helme
This is the fifth and final part of the IoT unravelled blog series. Part 1 was all about what a mess the IoT landscape is, but then there’s Home Assistant to unify it all. In part 2 I delved into networking bits and pieces, namely IP addresses, my Ubiquiti UniFiRead More IoT Unravelled Part 5: Practical Use Case Videos
The first few parts of this series have all been somewhat technical in nature; part 1 was how much of a mess the IoT ecosystem is and how Home Assistant aims to unify it all, part 2 got into the networking layer with both Wi-Fi and Zigbee and in partRead More IoT Unravelled Part 4: Making it All Work for Humans
5G and the IoT: A Look Ahead at What’s Next for Your Home and Community October is Cybersecurity Awareness Month, which is led by the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) in conjunction with the National Cyber Security Alliance (NCSA)—a national non-profit focused on cybersecurity education & awareness. McAfee is pleased to announce […]
The post 5G and the IoT: A Look Ahead at What’s Next for Your Home and Community appeared first on McAfee Blogs.Read More 5G and the IoT: A Look Ahead at What’s Next for Your Home and Community
Seven Tips for Protecting Your Internet-Connected Healthcare Devices: Cybersecurity Awareness Month October is Cybersecurity Awareness Month, which is led by the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) in conjunction with the National Cyber Security Alliance (NCSA)—a national non-profit focused on cybersecurity education & awareness. McAfee is pleased to announce that we’re a proud […]
The post Seven Tips for Protecting Your Internet-Connected Healthcare Devices appeared first on McAfee Blogs.Read More Seven Tips for Protecting Your Internet-Connected Healthcare Devices