Researchers discover weakness in IoT digital certificates

Credit to Author: Danny Bradbury| Date: Tue, 17 Dec 2019 12:10:45 +0000

IoT devices are using weak digital certificates that could expose them to attack, according to a study released over the weekend.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/zJlF9M3_vf4″ height=”1″ width=”1″ alt=””/>

Read more

Blockchain/IoT integration accelerates, hits a 'sweet spot'

Credit to Author: Lucas Mearian| Date: Wed, 11 Dec 2019 03:00:00 -0800

Three-quarters of companies implementing IoT have already adopted blockchain or plan to use it by the end of 2020, an indicator of the growing connection between the two, according to a survey of 500 U.S. companies by Gartner.

While the marriage between the two technologies has been expected to be crucial for  industry digital transformation, the adoption rate is happening at a “much faster pace than expected,” Gartner said.

“Among the blockchain adopters, 86% are implementing the two technologies together in various projects,” Avivah Litan, a Gartner vice president and report author,  wrote in a blog. She called IoT integration “a sweet spot” for blockchain, the much-hyped distributed ledger technology.

To read this article in full, please click here

Read more

The little-known ways mobile device sensors can be exploited by cybercriminals

Credit to Author: Logan Strain| Date: Wed, 11 Dec 2019 17:51:03 +0000

Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.

Categories:

Tags:

(Read more…)

The post The little-known ways mobile device sensors can be exploited by cybercriminals appeared first on Malwarebytes Labs.

Read more

Blockchain/IoT integration accelerates, hits a 'sweet spot' for the two technologies

Credit to Author: Lucas Mearian| Date: Wed, 11 Dec 2019 03:00:00 -0800

Three-quarters of companies implementing IoT have already adopted blockchain or plan to use it by the end of 2020, an indicator of the growing connection between the two, according to a survey of 500 U.S. companies by Gartner.

While the marriage between the two technologies has been expected to be crucial for  industry digital transformation, the adoption rate is happening at a “much faster pace than expected,” Gartner said.

“Among the blockchain adopters, 86% are implementing the two technologies together in various projects,” Avivah Litan, a Gartner vice president and report author,  wrote in a blog. She called IoT integration “a sweet spot” for blockchain, the much-hyped distributed ledger technology.

To read this article in full, please click here

Read more

Kids’ smartwatch security tracker can be hacked by anyone

Credit to Author: John E Dunn| Date: Thu, 28 Nov 2019 11:32:46 +0000

For researchers at testing outfit AV-Test, the SMA M2 kids’ smartwatch is just the tip of an iceberg of terrible security.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/OslMbiNGOKg” height=”1″ width=”1″ alt=””/>

Read more

IoT bills and guidelines: a global response

Credit to Author: Christopher Boyd| Date: Fri, 22 Nov 2019 16:27:47 +0000

IoT laws and guidelines abound, as we take a look what’s happening around the world in the name of securing Internet-connected devices.

Categories:

Tags:

(Read more…)

The post IoT bills and guidelines: a global response appeared first on Malwarebytes Labs.

Read more

Answering IoT Security Questions for CISOs

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Fri, 04 Oct 2019 16:17:47 +0000

Given the permeating nature of IoT and Industrial IoT devices in our daily lives, from smart homes to smart cities, one cannot escape the growing cybersecurity risks associated with these devices. It might leave CISOs with a lot of questions about how this newer, growing attack vector could impact their business. We hope to answer…

The post Answering IoT Security Questions for CISOs appeared first on .

Read more

15,000 webcams vulnerable to attack: how to protect against webcam hacking

Credit to Author: Christopher Boyd| Date: Tue, 24 Sep 2019 17:19:23 +0000

We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.

Categories:

Tags:

(Read more…)

The post 15,000 webcams vulnerable to attack: how to protect against webcam hacking appeared first on Malwarebytes Labs.

Read more

Are IoT Threats Discussed In The Cybercriminal Underground?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 10 Sep 2019 12:29:09 +0000

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on .

Read more