Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Billions of Windows and Linux devices are affected by a serious GRUB2 bootloader vulnerability dubbed BootHole that can be exploited to install persistent and stealthy malware. [Read More]
The United States and the United Kingdom warned in a joint alert issued this week that a piece of malware has infected over 62,000 QNAP NAS devices. [Read More]
Netgear has started releasing patches for ten vulnerabilities affecting nearly 80 of its products, including flaws disclosed last year at the Pwn2Own hacking contest. [Read More]
Driver vulnerabilities can facilitate attacks on ATMs, PoS systems and other devices, warns firmware security company Eclypsium. [Read More]
IBM has disclosed several vulnerabilities affecting powerline extenders from Tenda and says the vendor has ignored its emails and phone calls. [Read More]
Siemens this week announced that it is acquiring UltraSoC Technologies, a provider of analytics and monitoring solutions for SoCs. [Read More]
Microsoft has acquired industrial cybersecurity company CyberX in an effort to expand its Azure IoT security capabilities and extend them to IIoT and OT. [Read More]
Millions of IoT devices, including ones made by some of the world’s largest tech companies, are exposed to remote attacks due to vulnerabilities found in the Treck TCP/IP stack. [Read More]
Tencent is offering up to $140,000 for a single vulnerability found in its TencentOS Server or TencentOS tiny operating systems. [Read More]
DARPA is running a bug bounty program to find security vulnerabilities in a new, advanced implementation of the System Security Integration Through Hardware and Firmware (SSITH) program. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.