Please turn on your JavaScript for this page to function normally.
cables
IoT security testing and certification program

To help companies mitigate risks associated with an increasingly connected world, ICSA Labs, an independent division of Verizon, is rolling out a new security testing program …

Internet of Fail
Internet of Fail: How modern devices expose our lives

Should you sync your family’s calendar to your refrigerator or have it display photos? Samsung believes you should. They also think you need cameras that display the …

virtual reality
IoT and virtual reality: What’s next?

Smart doorbells, clever fridges, talking TVs, intelligent manufacturing, self-driving cars – all pretty cool. The IoT, in fact, is chock full of potentially very cool …

smartthings hub
Samsung’s smart home platform flaws let attackers fiddle with your doors

Researchers have managed to exploit design flaws in the Samsung SmartThings smart home programming platform and successfully mount a series of attacks that could result in …

DDoS
DDoS aggression and the evolution of IoT risks

Few organizations globally are being spared DDoS attacks, according to a Neustar survey of over 1,000 IT professionals across six continents. With the bombardment fairly …

Car
Review: The Car Hacker’s Handbook

About the author Craig Smith runs Theia Labs, a research firm that focuses on security auditing and building hardware and software prototypes. He is also a founder of the …

coin
Worldwide IoT security spending on the rise

Worldwide spending on Internet of Things security will reach $348 million in 2016, a 23.7 percent increase from 2015 spending of $281.5 million, according to Gartner. …

SkullConduct
A password for your eyewear computer: The sound of your skull

Could the unique frequency response your skull makes when hit with an ultrasonic signal be a good way for authenticating yourself to an eyewear computer (e.g. Google Glass, or …

traffic
Hacking and manipulating traffic sensors

With the advent of the Internet of Things, we’re lucky to have researchers looking into these devices and pointing out the need for securing them better. One of these …

lock
Cybercriminals are adopting corporate best practices

Cybercriminals are adopting corporate best practices and establishing professional businesses in order to increase the efficiency of their attacks against enterprises and …

IoT
Consumer concerns of a connected world

While consumers see the tangible benefit of IoT (just 1 consumer in 10 says a world of connected devices won’t deliver such value), more than half also harbour concerns …

IoT
The security impact of IoT evolution

Francis Bacon, First Viscount St. Alban (1561 – 1626), wrote, “As the births of living creatures, at first are ill-shapen, so are all innovations, which are the births of …

Don't miss

Cybersecurity news