Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Vulnerabilities found in a solar installation gateway sold by Tesla can be exploited to hijack a device and abuse it for further attacks. [Read More]
The company plans to expand its operations to the United States and Europe. [Read More]
IoT security firm Armis has announced another major funding round that brings total investment to $300 million at a $2 billion valuation. [Read More]
SecurityWeek today will host IoT Lockdown, a virtual event where attendees can learn about innovative strategies and tools to mitigate the risk of IoT devices connected to enterprise networks, along with industrial and smart city environments. [Read More]
ZDI announces Pwn2Own 2021, with a prize pool of $1.5 million, including $600,000 for hacking a Tesla and $200,000 for Zoom and Microsoft Teams exploits. [Read More]
An attacker would simply need to trick victims into accessing a specially crafted website. [Read More]
DNSpooq is the name given to 7 Dnsmasq vulnerabilities that could expose millions of devices to DNS cache poisoning, remote code execution and DoS attacks. [Read More]
Security researchers see 5,447 devices still connecting to a sinkholed VPNFilter C&C domain on a single day. [Read More]
the plan sets out priorities and goals around the establishment of global standards to define maritime threats, beefing up threat intel and information sharing, and increasing the cybersecurity workforce in the maritime sector. [Read More]
The FBI has warned that individuals who launch swatting attacks have been hacking smart home devices to see and sometimes live-stream their pranks. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.