Internet of Things

Monitoring scanning activities that could lead to IoT compromises
IoT devices are ideal targets for attackers looking to build DDoS botnets because they have limited or non-existent security features. Some IoT devices utilize hard-coded …

8.4 billion connected things will be in use worldwide in 2017
Gartner forecasts that 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. Total spending on endpoints …

Review: The Internet of Risky Things
About the author Professor Sean Smith is the Principal Investigator of the Dartmouth Trust Lab and Director of Dartmouth’s Institute for Security, Technology, and …

Don’t take your hands off the wheel
Let me tell you a story. It’s a story about my brother-in-law, whom, for the sake of decency, we’ll call Steve. Steve has a new car. He loves that new car. It’s great. Does …

Increasingly sophisticated attacks call for advanced protection tools
A new NTT Security report underscores the need for more advanced tools to protect organizations’ data and networks from the evolving tactics, techniques and procedures (TTPs) …

Connected homes and new hacking risks
Eight out of ten US consumers have a home data network and more than a third of them connect entertainment systems, gaming consoles and other smart devices to the Internet, …

Five emerging technology trends essential to business success
People hold the power to shape and apply technology to create positive change, improve lives, and transform business and society, according to Accenture Technology Vision …

Innovation and exploitation fuel DDoS attack landscape
Arbor Networks released its 12th Annual Worldwide Infrastructure Security Report offering direct insights from network and security professionals at global service providers, …

IoT MSSPs market revenues to top $11 billion in 2021
Industrial applications are set to be the core focus for IoT Managed Security Service Providers (MSSPs) with ABI Research forecasting overall market revenues to increase …

Family dynamics in a connected world
A new global study by Intel Security aims to better comprehend how families’ attitudes and habits are evolving as their homes and lifestyles become increasingly connected. …

Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!
A new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by Ben-Gurion University …

Growing risk associated with mobile and IoT application security
Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence