Secure your healthcare devices with Microsoft Defender for IoT and HCL’s CARE

Credit to Author: Lauren Goodwin| Date: Mon, 14 Mar 2022 16:00:00 +0000

Recently, Microsoft and global technology services firm HCL Technologies teamed up to help solve the security challenge with a high-performance solution for medical devices. The result is a new reference architecture and platform for building secure medical devices and services based on HCL’s CARE, Microsoft Defender for IoT and Azure IoT.

The post Secure your healthcare devices with Microsoft Defender for IoT and HCL’s CARE appeared first on Microsoft Security Blog.

Read more

Ironpie robot vacuum can suck up your privacy

Credit to Author: Lisa Vaas| Date: Mon, 02 Mar 2020 12:37:11 +0000

You might want to unplug this not-so-smart robot: researchers found they can watch video streams piped out from its security camera.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/kGtvD8tF-C4″ height=”1″ width=”1″ alt=””/>

Read more

Ring makes 2FA mandatory to keep hackers out of your doorbell account

Credit to Author: Lisa Vaas| Date: Thu, 20 Feb 2020 10:03:25 +0000

Amazon is following Google’s lead by forcing all users to use two-factor authentication when logging into their Ring accounts.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ZP4hOfnjH24″ height=”1″ width=”1″ alt=””/>

Read more

Defending the power grid against supply chain attacks—Part 1: The risk defined

Credit to Author: Todd VanderArk| Date: Tue, 18 Feb 2020 17:00:31 +0000

The “Defending the power grid against supply chain attacks” blog series analyzes how supply chain attacks are conducted and the steps utilities, device manufacturers, and software providers can take to better secure critical infrastructure.

The post Defending the power grid against supply chain attacks—Part 1: The risk defined appeared first on Microsoft Security.

Read more

Why secure your IoT Devices?

Credit to Author: Sachin Bobade| Date: Thu, 06 Feb 2020 10:45:22 +0000

Introduction to IoT This blog describes one of the current disruptive technologies in the market, i.e. IoT (Internet of Things) devices. The Internet of things (IoT) is the Internet of connected physical devices, vehicles, appliances and everyday objects that can collect & share information without any intervention. Due to IoT…

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Credit to Author: Pieter Arntz| Date: Tue, 28 Jan 2020 16:00:00 +0000

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Categories:

Tags:

(Read more…)

The post Explained: the strengths and weaknesses of the Zero Trust model appeared first on Malwarebytes Labs.

Read more

Google suspende a Xiaomi del Home Hub por vulnerabilidades de privacidad en sus cámaras

Credit to Author: Naked Security| Date: Wed, 08 Jan 2020 14:32:58 +0000

Google ha suspendido temporalmente las cámaras IP de Xiaomi de su servicio Home Hub después de que un usuario informara que estaba viendo imágenes de dispositivos de otras personas. Google Home Hub es la respuesta de la empresa al Echo de Amazon: un sistema de automatización del hogar conectado a Internet controlado a través de [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/yN_h3LNJswA” height=”1″ width=”1″ alt=””/>

Read more

How to secure your IoT deployment during the security talent shortage

Credit to Author: Todd VanderArk| Date: Tue, 17 Dec 2019 17:00:41 +0000

It’s complex work to define a security strategy for IoT—especially with a 3-million-person shortage of cybersecurity pros. But there is a way to augment existing security teams and resources.

The post How to secure your IoT deployment during the security talent shortage appeared first on Microsoft Security.

Read more

Researchers discover weakness in IoT digital certificates

Credit to Author: Danny Bradbury| Date: Tue, 17 Dec 2019 12:10:45 +0000

IoT devices are using weak digital certificates that could expose them to attack, according to a study released over the weekend.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/zJlF9M3_vf4″ height=”1″ width=”1″ alt=””/>

Read more

The little-known ways mobile device sensors can be exploited by cybercriminals

Credit to Author: Logan Strain| Date: Wed, 11 Dec 2019 17:51:03 +0000

Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.

Categories:

Tags:

(Read more…)

The post The little-known ways mobile device sensors can be exploited by cybercriminals appeared first on Malwarebytes Labs.

Read more