Internet of Things

Researcher hacks smart fingerprint padlock in mere seconds
The Tapplock one “smart” padlock, which received many rave reviews by tech-focused news sites and YouTubers, can be forced to open in under two seconds with a …

IoT connections to grow 140%, will reach 50 billion by 2022
New data has revealed that the total number of connected IoT sensors and devices is set to exceed 50 billion by 2022, up from an estimated 21 billion in 2018. Juniper Research …

Protecting consumers from mobile and IoT threats
A new report by Allot Communications revealed a dynamic and automated threat landscape in which consumers lack the security expertise to effectively protect themselves. Mobile …

Five keys to secure DevOps, cloud and IoT adoption
90 percent of enterprises are engaged with at least one next-generation technology (NGT), such as cloud, IoT, or AI, according to BeyondTrust. Yet, while enterprises are …

How Mirai spawned the current IoT malware landscape
When, in late 2016, US-based DNS provider Dyn suffered a massive DDoS attack that it resulted in the temporary unavailability of many popular online services, the name of the …

Airports develop digital transformation roadmaps with biometrics and blockchain
Increased passenger traffic and global capacity constraints will drive airport IT spending to $4.63 billion by 2023, according to Frost & Sullivan. Airports are …

The future of biometric modalities in consumer electronics
The battle for the future of biometric modalities in consumer electronics is expected to become fiercer with each passing year as face and iris recognition are continuously …

Smart cities: New threats and opportunities
As smart cities integrate connected technologies to operate more efficiently and improve the quality of city services, new vulnerabilities arise that require diligent …

The percentage of open source code in proprietary apps is rising
The number of open source components in the codebase of proprietary applications keeps rising and with it the risk of those apps being compromised by attackers leveraging …

Internet of Things: Who is watching you?
An overwhelming number of IT security professionals (85%) see a cyberattack on critical infrastructure happening in the next five years. Pwnie Express CEO Todd DeSisto says …

Relying on legacy security technologies leaves you blind to IoT threats
As shadow IoT infiltrate organizations, the variety of risks and threats stemming from these devices put networks and data at risk, according to 802 Secure. IoT and IIoT …

How consumers are embracing IoT
A CSG survey, which polled more than 2,000 consumers between the ages of 18 and 64, evaluated consumer understanding, usage and sentiment about current and future IoT …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence