The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Think Like an Attacker: Understanding Cybercriminals & Nation-State Threat Actor | Nov 16 Virtual Event <REGISTER NOW>
Event
Tips for A Streamlined Transition to Zero Trust | Sept 28 LIVE Webinar <REGISTER NOW>
Event
The Evolution of the Vulnerability Landscape in 2023 | Sept 27 LIVE Webinar <REGISTER NOW>
Previous
Next
IoT
Breaking news, news analysis, and expert commentary on cyber threats to Internet of Things (IoT) devices and the tools & technologies to protect them.
Growing Chinese Tech Influence in Africa Spurs 'Soft Power' Concerns
A working group is rolling out in developing parts of the world, in response to concerns about the amount of technology being rolled out and across Africa by Chinese companies.
September 21, 2023
A working group is rolling out in developing parts of the world, in response to concerns about the amount of technology being rolled out and across Africa by Chinese companies.
by Dan Raywood, Senior Editor, Dark Reading
September 21, 2023
4 MIN READ
Article
Hikvision Intercoms Allow Snooping on Neighbors
The intercoms are used in thousands of apartments and offices across the world, and they can be used to spy on targets through the other devices they connect to.
September 21, 2023
The intercoms are used in thousands of apartments and offices across the world, and they can be used to spy on targets through the other devices they connect to.
by Kristina Beek, Associate Editor, Dark Reading
September 21, 2023
4 MIN READ
Article
Name That Toon: Somewhere in Sleepy Hollow
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
September 19, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
September 19, 2023
1 MIN READ
Article
Federal Mandates on Medical-Device Cybersecurity Get Serious
In October, the US Food and Drug Administration will start rejecting medical devices that lack a secure design or a post-market cybersecurity plan.
September 13, 2023
In October, the US Food and Drug Administration will start rejecting medical devices that lack a secure design or a post-market cybersecurity plan.
by Robert Lemos, Contributing Writer, Dark Reading
September 13, 2023
4 MIN READ
Article
Rwanda Launches Smart-City Investment Program
The ambitious move by the nation also comes with cybersecurity risks.
September 07, 2023
The ambitious move by the nation also comes with cybersecurity risks.
by Dan Raywood, Senior Editor, Dark Reading
September 07, 2023
2 MIN READ
Article
Name That Toon: Swift as an Arrow
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
August 23, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
August 23, 2023
1 MIN READ
Article
Piles of Unpatched IoT, OT Devices Attract ICS Cyberattacks
Industrial devices are less likely to be patched due to expensive downtime, and threat actors have taken notice.
August 03, 2023
Industrial devices are less likely to be patched due to expensive downtime, and threat actors have taken notice.
by Becky Bracken, Editor, Dark Reading
August 03, 2023
2 MIN READ
Article
Tesla Jailbreak Unlocks Theft of In-Car Paid Features
Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs.
August 02, 2023
Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs.
by Tara Seals, Managing Editor, News, Dark Reading
August 02, 2023
5 MIN READ
Article
Best Practices for Enterprise Private 5G Security
Omdia's latest research with Trend Micro and CTOne sheds light on 5G security challenges and ways to effectively extend enterprise-grade security to 5G networks
July 31, 2023
Omdia's latest research with Trend Micro and CTOne sheds light on 5G security challenges and ways to effectively extend enterprise-grade security to 5G networks
by Hollie Hennessy, Senior Analyst, IoT Cybersecurity, Omdia
July 31, 2023
5 MIN READ
Article
Peloton Bugs Expose Enterprise Networks to IoT Attacks
Hackers have three key pathways — the OS, apps, and malware — for leveraging the popular home fitness equipment as initial access for data. compromise, ransomware, and more.
July 26, 2023
Hackers have three key pathways — the OS, apps, and malware — for leveraging the popular home fitness equipment as initial access for data. compromise, ransomware, and more.
by Elizabeth Montalbano, Contributor, Dark Reading
July 26, 2023
5 MIN READ
Article
Docker Leaks API Secrets & Private Keys, as Cybercriminals Pounce
Researchers found that the private keys and secrets they discovered being exposed within the Docker framework are already being used in the wild.
July 20, 2023
Researchers found that the private keys and secrets they discovered being exposed within the Docker framework are already being used in the wild.
by Dark Reading Staff, Dark Reading
July 20, 2023
2 MIN READ
Article
Study: Africa Cybersecurity Improves but Lacks Cross-Border Frameworks
While cybersecurity preparedness in Africa is on the upswing, the continent still lacks agreements on international security standards and sharing threat intel.
July 19, 2023
While cybersecurity preparedness in Africa is on the upswing, the continent still lacks agreements on international security standards and sharing threat intel.
by Dan Raywood, Senior Editor, Dark Reading
July 19, 2023
3 MIN READ
Article
Name That Toon: Shark Sighting
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
July 18, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
July 18, 2023
1 MIN READ
Article
Firedome Integrates With Microsoft Defender for IoT to Enhance IoT Device Security, Using Microsoft Sentinel
Firedome's on device real-time detection, prevention and response along with Microsoft Defender for IoT cloud-based security provides a holistic view of IoT attacks for the first time.
July 12, 2023
Firedome's on device real-time detection, prevention and response along with Microsoft Defender for IoT cloud-based security provides a holistic view of IoT attacks for the first time.
July 12, 2023
2 MIN READ
Article
Botnets Send Exploits Within Days to Weeks After Published PoC
Six months of honeypot data finds that 19% of traffic to sensors were malicious exploit attempts, and 95% of those attempts came from just three botnets.
July 06, 2023
Six months of honeypot data finds that 19% of traffic to sensors were malicious exploit attempts, and 95% of those attempts came from just three botnets.
by Robert Lemos, Contributing Writer, Dark Reading
July 06, 2023
4 MIN READ
Article