Are IoT Threats Discussed In The Cybercriminal Underground?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 10 Sep 2019 12:29:09 +0000

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…

The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on .

Read more

Google patches 8 security holes in Nest cameras

Credit to Author: John E Dunn| Date: Wed, 21 Aug 2019 11:02:22 +0000

The list of vulnerabilities recently discovered by researchers relate to one model, the Nest Cam IQ Indoor camera.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/b8ycfMnDE9o” height=”1″ width=”1″ alt=””/>

Read more

Google’s Nest webcam needs patching after flaws found

Credit to Author: John E Dunn| Date: Wed, 21 Aug 2019 11:02:22 +0000

The list of vulnerabilities recently discovered by researchers relate to one model, the Nest Cam IQ Indoor camera.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/b8ycfMnDE9o” height=”1″ width=”1″ alt=””/>

Read more

Facial recognition technology: force for good or privacy threat?

Credit to Author: Christopher Boyd| Date: Mon, 12 Aug 2019 15:00:00 +0000

It seems facial recognition technology, as technology so often does, has raced far ahead of our ability to define its ethical use. We take a hard look at major concerns brewing in cities around the world.

Categories:

Tags:

(Read more…)

The post Facial recognition technology: force for good or privacy threat? appeared first on Malwarebytes Labs.

Read more

8 ways to improve security on smart home devices

Credit to Author: Kayla Matthews| Date: Wed, 07 Aug 2019 15:00:00 +0000

Smart home devices aren’t the most secure, but they do make life more convenient. How can those who’ve embraced smart home tech stay as secure as possible? Here are eight ways.

Categories:

Tags:

(Read more…)

The post 8 ways to improve security on smart home devices appeared first on Malwarebytes Labs.

Read more

Researchers hack camera in fake video attack

Credit to Author: Danny Bradbury| Date: Thu, 01 Aug 2019 12:03:13 +0000

Tampering with surveillance cameras is a common activity for Hollywood heroes and criminals alike. Now, researchers have shown how they can do it in real life.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/t4JcdCzKtZI” height=”1″ width=”1″ alt=””/>

Read more

‘Urgent/11’ flaws affect 200 million devices – from routers to elevators

Credit to Author: John E Dunn| Date: Wed, 31 Jul 2019 16:43:19 +0000

There are 11 security flaws affecting VxWorks: “the most widely used operating system you may never have heard about”.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/nC9Xn3LZE9k” height=”1″ width=”1″ alt=””/>

Read more

Cyberattacks on connected cars could gridlock entire cities

Credit to Author: Lisa Vaas| Date: Wed, 31 Jul 2019 10:40:34 +0000

It would require taking over and stranding 20% of a city’s cars to freeze traffic, and only 10% to impede ambulances, physicists calculate.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/21-9DXPF4gg” height=”1″ width=”1″ alt=””/>

Read more

A week in security (June 24 – 30)

Credit to Author: Malwarebytes Labs| Date: Mon, 01 Jul 2019 17:02:56 +0000

A roundup of cybersecurity news from June 24–30, including top malicious web campaigns, updates on the GreenFlash Sundown exploit, a Malwarebytes initiative to double down on stalkerware detection and awareness, and more.

Categories:

Tags:

(Read more…)

The post A week in security (June 24 – 30) appeared first on Malwarebytes Labs.

Read more

How Will Companies Deploy Industrial IoT Security Solutions?

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 18 Jul 2019 14:05:42 +0000

Industrial IoT (IIoT) devices will comprise the majority of the billions of IoT devices deployed over the next decade. How will the information security market meet this onslaught of technology? The consumer market is not a useful guide for this analysis. Consumers buy in small quantities and choose to deploy information security tools piecemeal. Few…

The post How Will Companies Deploy Industrial IoT Security Solutions? appeared first on .

Read more