Cybersecurity firm ESET reported in February that billions of Wi-Fi-capable devices may have been at one point affected by a vulnerability that could have been exploited to obtain sensitive information from wireless communications. The security hole, named Kr00k and tracked as CVE-2019-15126, caused affected devices to use an all-zero encryption key to encrypt some of…

In 2020, IoT Security Must Be Part of Your Threat Management Strategy

Internet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or wireless connections and expanding the enterprise attack surface. In fact, enterprises nowadays likely have more internet of things (IoT) devices on their networks than traditional endpoints — according to Armis, by…

Israeli cybersecurity firm GuardKnox demonstrated the threat in a Formula 1 driving simulation at the Consumer Electronics show this week in Las Vegas. Moments into the virtual drive, a GuardKnox engineer playing the role of hacker struck and the steering wheel no longer controlled the speeding car. The faux race was over for the driver,…

With an installed base of 44 billion connected devices projected for 2023, the amount of data and information generated and shared will reach zettabytes of data, according to ABI Research. “Much of that data will be sensitive, whether about an individual’s privacy or confidential business information. As such, it presents a lucrative opportunity for threat…

IoT Attacks Up Significantly in First Half of 2019

Malicious actors aren’t tiring of the Internet of Things (IoT), with cyberattacks on network-connected smart devices and process controllers rapidly increasing in number. One network of honeypots, put in place by Kaspersky, saw 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of 2019, compared with just…

Oracle, Gemalto Downplay Java Card Vulnerabilities

In March, Poland-based Security Explorations reported identifying nearly 20 vulnerabilities in the latest version of Oracle Java Card (version 3.1), including weaknesses that can be exploited to compromise the security of chips using this technology. The firm has continued analyzing the software and it now claims to have found 34 issues. Java Card technology is…

BlackBerry Offers Its Security Technology to IoT Device Makers

BlackBerry, which recently announced the acquisition of endpoint security firm Cylance for $1.4 billion in cash, says its Secure technology can be licensed by third-party vendors for their Internet-connected devices. The Secure feature packs provide manufacturers a framework that should help them build safer and more secure products without the need to internally develop cybersecurity…