Internet of Things
![smart home](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104303/smart_home-400x200.jpg)
The privacy threat of IoT device traffic rate metadata
Even though many IoT devices for smart homes encrypt their traffic, a passive network observer – e.g. an ISP, or a neighborhood WiFi eavesdropper – can infer …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113231/iot-survey-400x200.jpg)
WannaCry and IoT: Vendors react
Among the organizations most gravely affected by the WannaCry ransomware was the UK National Health Service. According to The Sunday Times, 48 NHS organisations were hit, …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104343/iot-400x200.jpg)
Ready, set, race to the IoT hub
Battle lines are being drawn. Armies are being marshaled. Territory is being eyed and strategies drawn up with military precision. But this war is about to be fought in your …
![defend](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110116/defend-400x200.png)
Three cybersecurity threat trends that organizations should address today
The cybersecurity landscape grows seemingly more complex – and dangerous – by the day: Hackers and other bad actors unleash increasingly intricate and formidable attacks, on …
![smart hospitals, healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105723/smart-hospitals-400x200.jpg)
How to securely deploy medical devices within a healthcare facility
The risks insecure medical devices pose to patient safety are no longer just theoretical, and compromised electronic health records may haunt patients forever. A surgical …
BrickerBot bricked 2 million IoT devices, its author claims
The author of BrickerBot, which “bricks” IoT devices by rewriting the flash storage space and wiping files, has emerged to explain that the malware first attempts …
![IoT security](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110405/iot-security-400x200.jpg)
Hajime IoT worm infects devices to head off Mirai
Mirai is the name of the worm that has taken control of many IoT devices around the world and used them to mount DDoS attacks, the most high-profile of which was directed …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113503/building-400x200.jpg)
Bracing for the Denial of Things
Turn out the lights in any major city in the developed world, and you know what? It’s not really all that dark. Unless you’ve managed to lock yourself in a broom closet (I …
![IoT connection](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104554/iot-connection-400x200.jpg)
IoT devices under attack: Amnesia hijacks, BrickerBot destroys
Every hour of every day, computer systems and IoT devices are under attack by bots trying to recruit them into growing botnets. Security researchers have recently highlighted …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105149/idea-400x200.jpg)
The rise of InsurTech: How young startups influence a mature industry
Artificial intelligence (AI) and the Internet of Things (IoT) now account for almost half of total investment in insurance technology (InsurTech) startups globally, according …
![Miele washer](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104647/miele-washer-400x200.jpg)
Medical washer-disinfector appliance’s web server open to attack
Here’s a string of words that you probably never thought you’ll hear: An Internet-connected washer-disinfector appliance by German manufacturer Miele sports a …
![Nest Cam Outdoor](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104707/nest-camera-400x200.jpg)
Burglars can easily make Google Nest security cameras stop recording
Google Nest’s Dropcam, Dropcam Pro, Nest Cam Outdoor and Nest Cam Indoor security cameras can be easily disabled by an attacker that’s in their Bluetooth range, a …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints