Internet of Things

Cheap web cams can open permanent, difficult-to-spot backdoors into networks
They might seems small and relatively insignificant, but cheap wireless web cams deployed in houses and offices (and connected to home and office networks) might just be the …

Your smartwatch can give away your payment card’s PIN code
Smartwatches can be a perfectly useful and handy wearable device for some users, but it’s good to keep in mind that using them might mean opening yourself to an …

The danger of terror attacks using drones, and possible countermeasures
You can add terrorist-controlled drones to the list of dangers we need to be scared about in the future, the Oxford Research Group announced after publishing the latest report …

Fitbit, warranty fraud, and hijacked accounts
Online account hijackings usually end up with the account owners being the main victims, but there are fraudsters out there who are more interested in ripping off companies …

When hacking saves lives: Hacking medical devices and implants
Of all the IoT devices out there, none are more crucial to users than the medical devices that help them simplify the management of certain medical conditions or, in the most …

Wi-Fi HaLow to extend Wi-Fi solutions for the Internet of Things
With industry momentum mounting around a low power Wi-Fi solution, Wi-Fi Alliance announced the Wi-Fi HaLow designation for products incorporating IEEE 802.11ah technology. …

An Internet of Things wish list for 2016
I’ve been writing about the Internet of Things for a while now, both from the perspective of the great opportunities that the IoT offers and the very real pressure it will put …

Samsung announces GAIA, a Smart TV security solution
Samsung announced GAIA, a comprehensive three-layer security solution for its entire 2016 line up of Tizen-based Smart TVs. The service will give consumers protection across …

Top trends that will influence your security decisions in 2016
With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, …

Five key cybersecurity trends for 2016
The overwhelming shift to mobile and cloud computing among both businesses and consumers will see some surprising additions to the risk landscape in 2016. ISACA shares five …
Six trends that will further the development of the Internet of Things
1. The death of the password is rapidly approaching. New and more serious data breaches among well known consumer brands will continue to erode faith in perimeter and …
Next year, smart cities will use 1.6 billion connected things
Gartner estimates that 1.6 billion connected things will be used by smart cities in 2016, an increase of 39 percent from 2015.“Smart commercial buildings will be the …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence