US, China and the UK are top regions affected by IoT security threats

In the Internet of Things (IoT) ecosystem today, cyberattacks are becoming more diverse and sophisticated with cybercriminals taking over home network routers to launch attacks on smart home devices. Trend Micro’s recent report shows more than 1.8 million cyberattacks have been conducted through home network routers in the past six months. Eight percent of these…

IBM Launches Security Testing Services For Cars, IoT

IBM Security announced on Monday that the services provided by its X-Force Red penetration testing group have been expanded to include connected vehicles and Internet of Things (IoT) devices. IBM X-Force Red, which the company launched one year ago, has been working with automotive manufacturers and third-party suppliers to provide expertise and penetration testing and consulting services.

FBI Issues Warning on IoT Toy Security

IoT toys are more than fun and games and can potentially lead to a violation of children’s privacy and safety, the Federal Bureau of Investigation warned Monday. Internet-connected toys carry the potential of violating children’s privacy and safety, given the amount of information the toys can collect and store, the Federal Bureau of Investigation warned…

How Smart Cities Can Minimize the Threat of Cyber Attacks

As cities face the digital future, governments must prioritize cybersecurity protocols to mitigate attacks that could cripple entire communities. In the not-so-distant future, smart cities will weave the Internet of Things (IoT) and interconnected devices into existing technology infrastructure to bring entire communities online. Singapore, for example, recently launched its Smart Nation program, deploying citywide…

5 Unsettling cyberthreats

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter who’s trying it.  But what about the outliers? What about threats that impact you, but you can’t remediate, or establish a policy to cover? Here are 5 cyberthreats that if you’re not frightened by,…

New IoT malware targets 100,000 IP cameras via known flaw

Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products. The malware, called Persirai, has been found infecting Chinese-made wireless cameras since last month, security firm Trend Micro said on Tuesday. The malware does so by exploiting flaws in the cameras that a…

Wikileaks, CIA documents and some sober thoughts

So, my less than favorite topic found itself at the top of my reading list today. Wikileaks released a treasure trove of documents today that purport to outline all manner of CIA related operations. After I got passed the “what the actual…” moment, I had to pause. On social media and various news outlets there…

Zones of Trust: A New Way of Thinking about IoT Security

Recent attacks have focused attention on how to safely add “things”to enterprise networks, a topic that straddles IT and physical security. A zones-of-trust approach may be the answer. Last year, when attackers hacked into more than 25,000 Internet of Things (IoT) closed-circuit TV devices and used them in a denial-of-service botnet attack, this question was…