Internet of Things
![Building](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194404/corporate9-400x200.jpg)
Weak default credentials, command injection bug found in building operation software
A vulnerability in servers programmed with Schneider Electric’s StruxureWare Building Operation software can be exploited by a low-skilled, remote attacker to gain access to …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113858/abstract-400x200.jpg)
Ten technologies to unlock the full potential of the Internet of Things
Gartner has highlighted the top 10 Internet of Things (IoT) technologies that should be on every organization’s radar through the next two years. “The IoT demands …
![Lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114021/lock-400x200.jpg)
IoT wishes for RSA Conference 2016
With so many questions to be answered on the future of security and IoT, I’m happy to see that, once again, it’s that special time of the year when the collective movers and …
![Nissan LEAF](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194200/Nissan-Leaf-400x200.jpg)
Insecure APIs allow anyone to mess with Nissan LEAF electric car
A vulnerability in the mobile app used to interact with Nissan LEAF, a popular electric car, can be exploited by remote, unauthenticated attackers to switch the car’s AC …
![Binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195635/binary-sun-400x200.jpg)
Internet of Evil Things: The growing risks of connected devices
As risk and concern around connected Internet of Things (IoT) devices continues to grow, resources and visibility into such connected devices have stagnated despite the …
![ASUS](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194212/asus-400x200.jpg)
FTC forces Asus to improve router security
The Federal Trade Commission (FTC) is actively trying to make sure that companies secure the software and devices that they provide to consumers, and Tuesday’s …
![MouseJack](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194223/mousejack-400x200.jpg)
MouseJack: Remote exploitation via radio frequencies
Bastille has uncovered a massive vulnerability in wireless mice and keyboards that leaves billions of PC’s and millions of networks vulnerable to remote exploitation via radio …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194229/connections-400x200.jpg)
Working towards a common set of IoT standards
Major industry leaders who are invested in the future of the Internet of Things, announced they will unify as the Open Connectivity Foundation (OCF), an entity whose goal will …
![AT&T IoT report](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194243/att-iot-report-400x200.jpg)
Most businesses are considering or implementing IoT
The Internet of Things (IoT) is growing at an exponential rate. By 2020, some 50 billion devices will connect to the Internet and the economic value created by IoT could be …
![Volvo](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194255/volvo-keyless-400x200.jpg)
Volvo to launch a car without a physical key
Can you imagine accessing and driving your car without a physical key? In a first for the automotive industry, Volvo is set to become the first car manufacturer to offer cars …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194835/iot-400x200.png)
The rise of the Chief IoT Officer
Half of UK businesses (54%) plan to employ a Chief IoT Officer in the next year, especially in the education (63%), retail (63%) and telecomms (64%) industries, according to …
![Building](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194404/corporate9-400x200.jpg)
Smart buildings security: Who’s in charge?
As the Internet of Things became an accepted reality, and the security community realized that they have to get involved in securing it, days without news about the insecurity …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)