Internet of Things
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104943/hole-400x200.jpeg)
Millions of smart devices in Spain are vulnerable to attack
Avast revealed the findings of its research experiment into smart devices, including public and private webcam vulnerabilities in Spain, and, specifically, in Barcelona. Avast …
![mobile device](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111757/mobile-400x200.jpg)
500,000+ devices have dangerous apps installed
At Mobile World Congress (MWC) 2017, connected cars, the future of smart homes and, of course, the newest handsets are top of the agenda. Intel Security’s latest findings show …
![connections](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105436/connections-400x200.jpg)
How IoT initiatives impact the IT infrastructure
Internet of Things (IoT) infrastructure spending is making inroads into enterprise IT budgets across a diverse set of industry verticals. Improved business offerings, IoT data …
![connected](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113848/sophos-400x200.jpg)
Biggest limiting factors to universal adoption of connected devices
After surveying 250 respondents at CES 2017, the Open Connectivity Foundation (OCF) concluded that more than 60 percent of respondents consider standardization and …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105016/danger-400x200.jpg)
Advanced Windows botnet spreads Mirai malware
Kaspersky Lab experts are analyzing the first Windows-based spreader for the Mirai malware as part of a concerted effort to close down Mirai botnets in the wild. The Windows …
![samas-ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113333/samas-ransomware-400x200.jpg)
How to leverage intelligent deception to detect cyber attacks
Perimeters are fading, and attackers find it easier and easier to penetrate organizational networks. Organizational networks today are chaotic, they’re very dynamic, and this …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110724/iot-400x200.jpg)
The dangers that come with buying pre-owned IoT devices
When you buy a second-hand connected car, can you be sure that it is not still not reachable by its former owner? Similarly, when you sell your own connected car, how can you …
![blocks](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110054/blocks-400x200.jpg)
Data-centric IoT security for Hadoop Big Data environments
Hewlett Packard Enterprise (HPE) introduced today at RSA Conference 2017 HPE SecureData for Hadoop and IoT, designed to easily secure sensitive information that is generated …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105628/IoT-400x200.jpg)
Security programs not keeping up with IoT threats
More than 90 percent of IT security professionals said that connected devices will be a major security issue this year. However, 66% aren’t sure how many devices are in their …
![Search](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112405/search-threat-400x200.jpg)
Monitoring scanning activities that could lead to IoT compromises
IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110724/iot-400x200.jpg)
8.4 billion connected things will be in use worldwide in 2017
Gartner forecasts that 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. Total spending on endpoints …
![The Internet of Risky Things](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105136/book-internet_of_risky_things-400x200.jpg)
Review: The Internet of Risky Things
About the author Professor Sean Smith is the Principal Investigator of the Dartmouth Trust Lab and Director of Dartmouth’s Institute for Security, Technology, and …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints