Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
News & Commentary
A Most Personal Threat: Implantable Devices in Secure Spaces
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Do implantable medical devices pose a threat to secure communication facilities? A Virginia Tech researcher says they do, and the problem is growing.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/8/2020
Comment0 comments  |  Read  |  Post a Comment
Drone Path Often Reveals Operator's Location
Robert Lemos, Contributing WriterNews
The threat posed by drones to critical infrastructure and other operational technology is made more serious by the inability of law enforcement to locate operators, researchers say.
By Robert Lemos Contributing Writer, 7/7/2020
Comment1 Comment  |  Read  |  Post a Comment
How to Assess More Sophisticated IoT Threats
Jack Mannino, CEO, nVisiumCommentary
Securing the Internet of Things requires diligence in secure development and hardware design throughout the product life cycle, as well as resilience testing and system component analysis.
By Jack Mannino CEO, nVisium, 7/6/2020
Comment0 comments  |  Read  |  Post a Comment
7 IoT Tips for Home Users
Steve Zurier, Contributing Writer
Whether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep everyone secure.
By Steve Zurier Contributing Writer, 7/2/2020
Comment0 comments  |  Read  |  Post a Comment
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark ReadingNews
A series of IoT vulnerabilities could put hospital networks, medical data, and patient safety at risk.
By Kelly Sheridan Staff Editor, Dark Reading, 6/30/2020
Comment12 comments  |  Read  |  Post a Comment
COVID-19 Puts ICS Security Initiatives 'On Pause'
Nicole Ferraro, Contributing WriterNews
Security pros concerned that increased remote access to vulnerable operational technology and stalled efforts to harden OT environments puts critical infrastructure at greater risk.
By Nicole Ferraro Contributing Writer, 6/30/2020
Comment1 Comment  |  Read  |  Post a Comment
Another Record-Breaking DDoS Attack Signals Shift in Criminal Methods
Ericka Chickowski, Contributing WriterNews
Malicious botnet sources explode in new attacks that push boundaries in terms of volume and duration.
By Ericka Chickowski Contributing Writer, 6/25/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Acquires IoT/OT Security Firm CyberX
Dark Reading Staff, Quick Hits
Deal extends Microsoft Azure for legacy industrial devices.
By Dark Reading Staff , 6/22/2020
Comment1 Comment  |  Read  |  Post a Comment
Firmware Flaw Allows Attackers to Evade Security on Some Home Routers
Robert Lemos, Contributing WriterNews
Networking devices sold under at least one major brand have a firmware vulnerability that allows hackers to take control of the device, a cybersecurity firm claims.
By Robert Lemos Contributing Writer, 6/22/2020
Comment0 comments  |  Read  |  Post a Comment
What Will Cybersecurity's 'New Normal' Look Like?
Curtis Franklin, Security Editor
The coronavirus pandemic has forced changes for much of the business world, cybersecurity included. What can we expect going forward?
By Curtis Franklin Security Editor, 6/19/2020
Comment2 comments  |  Read  |  Post a Comment
'Ripple20' Bugs Plague Enterprise, Industrial & Medical IoT Devices
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers discover 19 vulnerabilities in a TCP/IP software library manufacturers have used in connected devices for 20 years.
By Kelly Sheridan Staff Editor, Dark Reading, 6/16/2020
Comment0 comments  |  Read  |  Post a Comment
IoT Security Trends & Challenges in the Wake of COVID-19
Tanner Johnson, Senior Analyst, Connectivity & IoT, OMDIACommentary
The demand for Internet of Things security practices that protect sensitive medical equipment and data will double within the next five years. Here's why.
By Tanner Johnson Senior Analyst, Connectivity & IoT, OMDIA, 6/16/2020
Comment0 comments  |  Read  |  Post a Comment
When Your Biggest Security and Privacy Threats Come From the Ones You Love
Ericka Chickowski, Contributing WriterNews
Research examines the risks and design challenges of accounting for privacy threats in intimate relationships.
By Ericka Chickowski Contributing Writer, 6/10/2020
Comment0 comments  |  Read  |  Post a Comment
Asset Management Mess? How to Get Organized
Joan Goodchild, Contributing WriterNews
Hardware and software deployments all over the place due to the pandemic scramble? Here are the essential steps to ensure you can find what you need -- and secure it.
By Joan Goodchild Contributing Writer, 6/10/2020
Comment1 Comment  |  Read  |  Post a Comment
Social Distancing for Healthcare's IoT Devices
Ori Bach, CEO of TrapX SecurityCommentary
Security pros need to double down around prevention of lateral movement by attackers, especially if IoT devices are connected to the network.
By Ori Bach CEO of TrapX Security, 6/3/2020
Comment0 comments  |  Read  |  Post a Comment
26 IoT Flaws Enable Denial-of-Service Attacks, Privilege Escalation
Dark Reading Staff, Quick Hits
Research details vulnerabilities in the Zephyr Real Time Operating Systems and MCUboot, both used in IoT devices and sensors.
By Dark Reading Staff , 6/1/2020
Comment0 comments  |  Read  |  Post a Comment
Most Bluetooth Devices Vulnerable to Impersonation Attacks
Jai Vijayan, Contributing WriterNews
Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.
By Jai Vijayan Contributing Writer, 5/21/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Reportedly in Talks to Acquire CyberX
Dark Reading Staff, Quick Hits
CyberX was founded in 2013 and has raised $48 million to build its cybersecurity platform for IoT and industrial control systems.
By Dark Reading Staff , 5/6/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Challenges Security Researchers to Hack Azure Sphere
Kelly Sheridan, Staff Editor, Dark ReadingNews
Participants can earn up to $100,000 for finding severe flaws in Microsoft's Linux-based Azure Sphere IoT operating system.
By Kelly Sheridan Staff Editor, Dark Reading, 5/5/2020
Comment1 Comment  |  Read  |  Post a Comment
Designing Firmware Resilience for 3 Top Attack Vectors
Burzin Daruwala, Senior Offensive Security Researcher Manager,  Intel Corp.Commentary
Firmware has become an increasingly prevalent target for hackers. Here's how to stop them.
By Burzin Daruwala Senior Offensive Security Researcher Manager, Intel Corp., 5/5/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by stonde
Current Conversations Thank you.
In reply to: Interesting article
Post Your Own Reply
Posted by Qualitybacklinks
Current Conversations yes, i hope so
In reply to: Re: Affected devices
Post Your Own Reply
Posted by FlynneTrobe
Current Conversations yes, i hope so
In reply to: Re: Affected devices
Post Your Own Reply
More Conversations
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14499
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials.
CVE-2020-14501
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper authentication for critical function (CWE-306) issue. Successful exploitation of this vulnerability may allow an attacker to obtain the information of the user table, including the administrator credentials in plain text. An attacker may also ...
CVE-2020-14503
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper input validation vulnerability. Successful exploitation of this vulnerability could allow an attacker to remotely execute arbitrary code.
CVE-2020-14497
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vulnerable to the use of an attacker-controlled string in the construction of SQL queries. An attacker could extract user credentials, read or modify information, and remotely execute code.
CVE-2020-14505
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in a command (“command injection�) vulnerability. Successful exploitation of this vulnerability may allow an attacker to send a HTTP GET or POST request that create...