News & Commentary

Latest Content tagged with IoT
Page 1 / 2   >   >>
Google 'Distrust Dates' Are Coming Fast
Commentary  |  3/13/2018
All the tools are in place for the migration of SSL digital certificates on a scale that is unprecedented for the certificate authority industry. Are you ready?
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Commentary  |  3/12/2018
Proposed new connected-product repair laws will provide hackers with more tools to make our lives less secure.
What Happens When You Hold Robots for Ransom?
News  |  3/10/2018
Researchers explore why an attacker would target robots with ransomware, and the implications of what might happen if they did.
Connected Cars Pose New Security Challenges
Commentary  |  3/6/2018
The auto industry should seize the opportunity and get in front of this issue.
Securing the Web of Wearables, Smartphones & Cloud
News  |  3/1/2018
Why security for the Internet of Things demands that businesses revamp their software development lifecycle.
How & Why the Cybersecurity Landscape Is Changing
Commentary  |  3/1/2018
A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.
What Enterprises Can Learn from Medical Device Security
Commentary  |  3/1/2018
In today's cloud-native world, organizations need a highly distributed approach that ties security to the workload itself in order to prevent targeted attacks.
How to Secure 'Permissioned' Blockchains
Commentary  |  2/28/2018
At the heart of every blockchain is a protocol that agrees to the order and security of transactions in the next block. Here's how to maintain the integrity of the chain.
6 Cybersecurity Trends to Watch
Commentary  |  2/26/2018
Expect more as the year goes on: more breaches, more IoT attacks, more fines
10 Can't-Miss Talks at Black Hat Asia
Slideshows  |  2/23/2018
With threats featuring everything from nation-states to sleep states, the sessions taking place from March 20-23 in Singapore are relevant to security experts around the world.
Anatomy of an Attack on the Industrial IoT
Commentary  |  2/22/2018
How cyber vulnerabilities on sensors can lead to production outage and financial loss.
The Mobile Threat: 4 out of 10 Businesses Report 'Significant' Risk
News  |  2/21/2018
Organizations put efficiency and profit before security, leading to system downtime and data loss, according to inaugural research from Verizon.
Siemens Leads Launch of Global Cybersecurity Initiative
News  |  2/16/2018
The new 'Charter of Trust' aims to make security a key element of the digital economy, critical infrastructure.
As Primaries Loom, Election Security Efforts Behind Schedule
Quick Hits  |  2/13/2018
While federal agencies lag on vulnerability assessments and security clearance requests, the bipartisan Defending Digital Democracy Project releases three new resources to help state and local election agencies with cybersecurity, incident response.
Ukraine Power Distro Plans $20 Million Cyber Defense System
Quick Hits  |  2/6/2018
After NotPetya and severe blackouts, Ukrenergo responds with an investment in cybersecurity.
Mastering Security in the Zettabyte Era
Commentary  |  2/5/2018
Many businesses are ill-equipped to deal with potential risks posed by billions of connected devices, exponential data growth, and an unprecedented number of cyber threats. Here's how to prepare.
IoT Botnets by the Numbers
Slideshows  |  1/31/2018
IoT devices are a botherder's dream attack-vector.
Strava Fitness App Shares Secret Army Base Locations
Quick Hits  |  1/29/2018
The exercise tracker published a data visualization map containing exercise routes shared by soldiers on active duty.
Endpoint and Mobile Top Security Spending at 57% of Businesses
Quick Hits  |  1/26/2018
Businesses say data-at-rest security tools are most effective at preventing breaches, but spend most of their budgets securing endpoint and mobile devices.
10 Costs Your Cyber Insurance Policy May Not Cover
Slideshows  |  1/23/2018
All the things you might think are covered but that don't actually fall under most policies.
Feds Team with Foreign Policy Experts to Assess US Election Security
News  |  1/18/2018
Expert panel lays out potential risks for the 2018 election cycle and beyond
Majority of Companies Lack Sufficient IoT Policy Enforcement Tools
Quick Hits  |  1/12/2018
Shortfall exists despite nearly all global technology enterprise companies having security policies to manage IoT devices.
Privacy: The Dark Side of the Internet of Things
Commentary  |  1/11/2018
Before letting an IoT device into your business or home, consider what data is being collected and where it is going.
The Internet of (Secure) Things Checklist
Commentary  |  1/4/2018
Insecure devices put your company at jeopardy. Use this checklist to stay safer.
In Mobile, It's Back to the Future
Commentary  |  1/3/2018
The mobile industry keeps pushing forward while overlooking some security concerns of the past.
A Pragmatic Approach to Fixing Cybersecurity: 5 Steps
Commentary  |  1/3/2018
The digital infrastructure that supports our economy, protects our national security, and empowers our society must be made more secure, more trusted, and more reliable. Here's how.
The Argument for Risk-Based Security
Commentary  |  1/2/2018
A scanner can identify a vulnerability, but only a deep understanding of cyber exposure will tell you about the seriousness of that risk. Here's how and why.
Hacker Targeted Huawei Router 0-Day in Attempt to Create New Mirai Botnet
Quick Hits  |  12/27/2017
Thousands of attempts have been made to exploit a zero-day vulnerability in the Huawei home router HG532.
2017 Security Predictions through the Rear Window
Commentary  |  12/26/2017
If you're going to forecast the future, go big.
Network Printer & Scanner Spoofing Campaign Targets Millions
Quick Hits  |  12/22/2017
Cybercriminals distribute malicious email attachments purportedly coming from three common brands of network printer-scanner devices.
CISO Holiday Miracle Wish List
Slideshows  |  12/22/2017
If CISOs could make a wish to solve a problem, these would be among the top choices.
Why Network Visibility Is Critical to Removing Security Blind Spots
Commentary  |  12/21/2017
You can't secure what you can't see. Here are four ways to shine a light on the dark spaces of your corporate infrastructure.
Top 8 Cybersecurity Skills IT Pros Need in 2018
Slideshows  |  12/18/2017
Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.
TRITON Attacker Disrupts ICS Operations, While Botching Attempt to Cause Physical Damage
News  |  12/14/2017
TRITON malware is discovered after an attack on a safety monitoring system accidentally triggered the shutdown of an industrial process at an undisclosed organization.
BlueBorne Attack Highlights Flaws in Linux, IoT Security
News  |  12/14/2017
Bluetooth vulnerabilities let attackers control devices running Linux or any OS derived from it, putting much of the Internet of Things at risk, including popular consumer products.
Healthcare Faces Poor Cybersecurity Prognosis
News  |  12/13/2017
Experts say the healthcare industry is underestimating security threats as attackers continue to seek data and monetary gain.
Nearly 2/3 of Industrial Companies Lack Security Monitoring
Quick Hits  |  12/6/2017
New Honeywell survey shows more than half of industrial sector organizations have suffered cyberattacks.
The Rising Dangers of Unsecured IoT Technology
Commentary  |  12/4/2017
As government regulation looms, the security industry must take a leading role in determining whether the convenience of the Internet of Things is worth the risk and compromise of unsecured devices.
Hacked IV Pumps and Digital Smart Pens Can Lead to Data Breaches
News  |  12/4/2017
Researcher to reveal IoT medical device dangers at Black Hat Europe this week.
Mobile Malware Incidents Hit 100% of Businesses
News  |  11/17/2017
Attempted malware infections against BYOD and corporate mobile devices are expected to continue to grow, new data shows.
Stealthy Android Malware Found in Google Play
News  |  11/15/2017
Eight apps found infected with a new Trojan family that ups the ante in obfuscation with four payload stages.
Who Am I? Best Practices for Next-Gen Authentication
Commentary  |  11/15/2017
By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords.
Enterprise Physical Security Drives IoT Adoption
News  |  11/14/2017
The vast majority of respondents to a new survey are deploying IoT technologies for building safety in the form of security cameras.
ADT Expands Cybersecurity Business with Purchase of Datashield
News  |  11/14/2017
Home and business security giant launches ADT Cybersecurity to offer managed detection and response (MDR) service.
Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches
News  |  11/9/2017
Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.
The IoT Blindspot
News  |  11/8/2017
Confusion over whether IT staff or line of business professions are responsible for IoT management and security plays big role in a lack of visibility into those devices.
Cybercriminals Employ 'Driveby' Cryptocurrency Mining
News  |  11/8/2017
Mining digital coins is a legal activity, but cybercriminals have discovered a new way to inject malware to perform the task.
Majority of US Companies' DDoS Defenses Breached
Quick Hits  |  11/7/2017
Survey finds 69% of companies' distributed denial-of-service attack defenses were breached in the past year - despite confidence in their mitigation technologies.
DDoS Flaw Found in Brother Printers
Quick Hits  |  11/6/2017
All Brother printers with a Debut Web front-end carry a flaw that allows attackers to distribute a single malformed HTTP POST request, researchers revealed today.
8 Older Companies Doing New Things in Security
Slideshows  |  11/6/2017
These organizations have been around for a while but aren't slowing down on security releases.
Page 1 / 2   >   >>

Disappearing Act: Dark Reading Caption Contest Winners
Marilyn Cohodas, Community Editor, Dark Reading,  3/12/2018
Microsoft Report Details Different Forms of Cryptominers
Kelly Sheridan, Staff Editor, Dark Reading,  3/13/2018
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.