Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

02:00 PM
Dark Reading
Dark Reading
Products and Releases

IOActive Launches New Hardware Lab

Company adds new Global 50 clients to roster, expands into Middle East

Seattle, USA — March 23, 2015IOActive, Inc., the leading global provider of hardware, software, and wetware security services, announced strong business results for the fiscal year ending December 31, 2014. Growth was driven by innovative and groundbreaking research, as well as international expansion and success in vertical markets.

“IOActive had an incredible 2014 that celebrated several firsts,” said Jennifer Steffens, chief executive officer for IOActive. “Innovative research from our team helped secure success for us in vertical, emerging markets and also drove expansion within our Industrial and Vehicle practice areas globally.”

“Our steady growth is indicative of the fact that every company–be it a start-up or a 40-year-old Fortune 500 company–is a target for attackers and cyber criminals,” said Matt Rahman, executive vice president of global sales and marketing for IOActive. “Third-party security assessment is no longer a ‘nice to have’ for companies, but an accepted organizational best practice.”

Key highlights for 2014 include:

         Industry-leading Research by IOActive Staff

o   Mobile banking apps research highlighted vulnerabilities in mobile banking applications from some of the most influential banks around the world.  

o   SATCOM security research revealed issues in the satellite communication (SATCOM) terminals used by the aerospace, maritime, military and government, emergency service, industrial (oil rigs, gas, electricity), and media sectors.

o   Traffic control systems research highlighted issues in traffic control systems around the world, laying the foundation for bigger security issues facing Smart Cities.

o   Vehicle security research examined the world of the connected car and what it means to the automotive industry.

        Market Growth and Expansion

In addition to expanding into the Middle East, IOActive continued to add new customers throughout the US, Europe, Asia, and Africa.

        Expanding Service Practice Areas

IOActive expanded its Vehicle Security Service practice. The company now offers full vehicle assessments and private research, as well as a Vehicle Security Development Lifecycle program. IOActive also appointed Twitter’s Charlie Miller to its Advisory Board.         

IOActive’s Industrial Service practice has been updated to address the Industrial Internet of Things (IoT) and shifts in Operational Technology (OT) customers, as well as new advances in the transportation and healthcare industries.

        Industry Recognition

IOActive was included on the list of Cool Vendors for Managing OT in a Digital Business, 2014 [1] report by Gartner, Inc.

New Hardware Lab

In addition to today’s results announcement, IOActive is launching a newly expanded hardware lab to provide services from chip to code. The lab underwent a significant transformation in 2014 when it relocated to a 5,000 square-foot space equipped with Scanning Electron Microscopes (SEMs), Focussed Ion Beams (FIBs), confocal optical imaging equipment, and a variety of analytical tools. As adversaries exploit hardware, IOActive will stay ahead through continued research.

The lab offers:

?         Embedded device security analysis

?         Physical attack resistance

?         Low-level device firmware and driver assessment

?         Chip and semiconductor analysis

?         Several other services not made public

For a video overview of the lab, presented by Jason Larsen, principal security consultant for IOActive, please visit: http://www.ioactive.com/labs/resources-white-papers.html

About IOActive

IOActive is a comprehensive, high-end information security services firm with a long and established track record in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment to chip reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, US, with global operations through the Americas, EMEA, and Asia Pac regions. Visit www.ioactive.com for more information. Read the IOActive Labs Research Blog: http://blog.ioactive.com. Follow IOActive on Twitter: http://twitter.com/ioactive.

Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

[1] Gartner “Cool Vendors for Managing OT in a Digital Business, 2014” by Kristian Steenstrup, Earl Perkins, Alfonso Velosa, April 22, 2014


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Kelly Sheridan, Staff Editor, Dark Reading,  10/27/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-28
An XSS vulnerability in the auto-complete function of the description field (for new or edited transactions) in Firefly III before 5.4.5 allows the user to execute JavaScript via suggested transaction titles. NOTE: this is exploitable only in a non-default configuration where Content Security Policy...
PUBLISHED: 2020-10-28
Gophish before 0.11.0 allows the creation of CSV sheets that contain malicious content.
PUBLISHED: 2020-10-28
Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the Host field on the send profile form.
PUBLISHED: 2020-10-28
Cross Site Scripting (XSS) vulnerability in Gophish through 0.10.1 via a crafted landing page or email template.
PUBLISHED: 2020-10-28
Gophish before 0.11.0 allows SSRF attacks.