- IoT -

Last update 09.10.17 13:14:50

HOME  2020  2019  2018  2017  1  2  


Date

Name

Category

Web

30.3.20

Why we need to secure IoT connections sooner than later

IoT

Net-security

23.3.20

Zyxel NAS, firewalls and LILIN DVRs and IP cameras conscripted into IoT botnet

BotNet  IoT

Net-security

22.3.20

Mukashi, the new Mirai variant that targets Zyxel NAS

BotNet  IoT

Securityaffairs

22.3.20

Mukashi: A New Mirai IoT Botnet Variant Targeting Zyxel NAS Devices

BotNet  IoT

Thehackernews

18.3.20

Tech Companies Partner to Securely Connect IoT to Cloud IoT Securityweek
13.3.20

Cloud + BYOD + IoT = major security gap

IoT  Safety

Net-security
12.3.20 More Than Half of IoT Devices Vulnerable to Severe Attacks IoT

Threatpost

7.3.20

IoT Security Firm Ordr Increases Funding to $50 Million

IoT

Securityweek

28.2.20

IoT Insecurity: When Your Vacuum Turns on You

IoT

Threatpost

27.2.20

Shadow IoT: A growing threat to enterprise security

IoT

Net-security

26.2.20

Mixed-signal circuits can stop side-channel attacks against IoT devices

IoT

Net-security

18.2.20

Hacking IoT devices with Focaccia-Board: A Multipurpose Breakout Board to hack hardware in a clean and easy way!

Hacking  IoT

Securityaffairs
18.2.20

ExtraHop Expands Enterprise IoT Security Features

IoT

Securityweek
9.2.20 IoT devices at major Manufacturers infected with crypto-miner Cryptocurrency  IoT Securityaffairs
8.2.20 IoT Devices at Major Manufacturers Infected With Malware via Supply Chain Attack Attack  IoT  Virus Securityweek

6.2.20

New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers

IoT  Virus

Threatpost

6.2.20

Honware: IoT honeypot for detecting zero-day exploits

Exploit  IoT

Net-security

6.2.20

How IoT devices open a portal for chaos across the network

IoT

Net-security

5.2.20

Mobile data roaming traffic generated by consumer and IoT devices expected to surge

IoT  Mobil

Net-security
29.1.20 LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT Networks Crypto  IoT Threatpost
28.1.20 Cisco Launches Industrial IoT Security Solution IoT Securityweek
28.1.20

Mandatory IoT Security in the Offing with U.K. Proposal

IoT

Threatpost

22.1.20 Hacker Leaks More Than 500K Telnet Credentials for IoT Devices IoT

Threatpost

20.1.20 Bot list with Telnet credentials for more than 500,000 servers and IoT devices leaked online BotNet  IoT Securityaffairs
17.1.20

IoT cybersecurity’s worst kept secret

IoT

Net-security

9.1.20

California’s IoT cybersecurity bill: What it gets right and wrong

IoT

Net-security

31.12.19

IoT Company Wyze Leaks Emails, Device Data of 2.4

Incindent  IoT

Threatpost

24.12.19

Top 10 IoT Disasters of 2019

IoT

Threatpost

17.12.19

Echobot IoT Botnet Casts a Wide Net with Raft of Exploit Additions BotNet  IoT  Exploit Threatpost
12.12.19

Consumers not willing to compromise when it comes to IoT security

IoT

Net-security

2.12.19

5G IoT security: Opportunity comes with risks

IoT  Mobil

Net-security

28.11.19

IoT Smartwatch Exposes Kids’ Personal, GPS Data

IoT  Privacy

Threatpost

22.11.19

Create secure IoT products: Enable security by design

IoT

Net-security

20.11.19

California IoT security law: What it means and why it matters

IoT

Net-security

14.11.19

IoT Security Woes Plague Healthcare Industry

IoT

Threatpost

7.11.19

GUI Now Available for Kamerka ICS/IoT Reconnaissance Tool ICS  IoT Securityweek

5.11.19

IoT is an ecosystem, as secure as its weakest link

IoT

Net-security

28.10.19

Integrating security into IoT projects is not easy, but it’s increasingly urgent

IoT

Net-security

25.10.19 The Threat to SoHo IoT Devices is Growing Rapidly IoT Securityweek

23.10.19

How to reduce the risk posed by vulnerabilities in IoT/ICS networks?

ICS  IoT  Vulnerebility

Net-security
18.10.19

Security still top priority as more enterprises scale IoT solutions company-wide

IoT

Net-security

15.10.19

IoT: a malware story

IoT  Virus

Securelist

14.10.19

New data analysis approach could strengthen the security of IoT devices

IoT

Net-security

1.10.19

Gucci IOT Bot Discovered Targeting European Region BotNet  IoT Securityaffairs

30.9.19

New 'Gucci' IoT Botnet Targets Europe BotNet   IoT Securityweek

27.9.19

5G and IoT: How to Approach the Security Implications

IoT  Mobil

Threatpost

19.9.19

Threat landscape for smart buildings IoT Securelist
16.9.19

Exploitation of IoT devices and Windows SMB attacks continue to escalate

Exploit  IoT

Net-security

12.9.19

IIoT security challenges: Dealing with cutting edge technologies

IoT

Net-security

11.9.19

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked IoT Securityaffairs

11.9.19

IoT attacks increasing in the cyber underground

IoT

Net-security

10.9.19

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked

Hacking  IoT

Securityaffairs

10.9.19

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack

IoT  Virus

Threatpost

5.9.19

Creator of multiple IoT botnets, including Satori, pleaded guilty BotNet  IoT Securityaffairs

4.9.19

IoT Security Challenges in a 5G Era: Expert Advice

IoT

Threatpost

3.9.19

Researchers develop cheaper, more efficient Internet connectivity for IoT devices

IoT

Net-security

1.9.19 New IoT botnet named Ares that is targeting Android-based devices IoT Securityaffairs

22.8.19

Identifying vulnerable IoT devices by the companion app they use

IoT

Net-security

10.8.19

Hack of High-End Hotel Smart Locks Shows IoT Security Fail

IoT

Threatpost

7.8.19

Russian Hackers Leverage IoT Devices to Access Corporate Networks

Hacking  IoT

Securityweek

5.8.19

Organizations Lack Confidence in Securing IoT, Survey Shows

IoT

Securityweek

2.8.19

Unpatched Flaws in IoT Smart Deadbolt Open Homes to Danger

IoT  Vulnerebility

Threatpost

2.8.19

Many companies don’t know the depth of their IoT-related risk exposure

IoT

Net-security

31.7.19

Microsoft Adds IoT Device Protection to Azure Security Center IoT

Bleepingcomputer

31.7.19

Microsoft Makes Azure Security Center for IoT Generally Available

IoT  Security

Securityweek

29.7.19

Sonicwall warns of a spike in the number of attacks involving encrypted malware and IoT malware IoT  Virus

Securityaffairs

27.7.19

Streaming Service Suffers 13-Day DDoS Siege by IoT Botnet

Attack  IoT

Bleepingcomputer

22.7.19

On the IoT road: perks, benefits and security of moving smartly IoT Securelist

22.7.19

Healthcare’s blind spot: Unmanaged IoT and medical devices

IoT

Net-security

16.7.19

IIoT risks of relying heavily on edge computing

IoT

Net-security

12.7.19

Global IoT market projected to reach $1111.3 billion by 2026

IoT

Net-security

28.6.19

"Silexbot" Malware Bricks IoT Devices

IoT

Securityweek

28.6.19

Thousands of IoT Devices Bricked By Silex Malware

IoT

Threatpost

26.6.19

Silex malware bricks thousands of IoT devices in a few hours

IoT  Virus

Securityaffairs

21.6.19

41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025

IoT

Net-security

20.6.19

IoT explodes worldwide, researchers investigate security issues present in the devices real users own

IoT

Net-security

20.6.19

Botnets shift from Windows towards Linux and IoT platforms

BotNet  IoT

Net-security

19.6.19

Consumers Urged to Junk Insecure IoT Devices

IoT

Threatpost

17.6.19

Worldwide IoT spending forecast to reach $726 billion this year

IoT

Net-security

14.6.19

5G subscriptions to reach 1.9 billion in 2024, critical IoT connections on the rise

IoT

Net-security

13.6.19

Smart home security devices most at risk in IoT-targeted cyber attacks

IoT

Net-security

6.6.19

IoT Security Regulation is on the Horizon

IoT

Threatpost

31.5.19

Industry is Not Prepared for the IIoT Attacks that Have Already Begun

IoT

Securityweek

30.5.19

5G IoT: Literally a Matter of Life or Death

IoT

Threatpost

30.5.19

New initiative aims to strengthen IoT security, interoperability and reliability

IoT

Net-security

29.5.19

IoT cyberattacks are the new normal, the security mindset isn’t

IoT

Net-security

24.5.19

Enterprises: Analyze your IoT footprint to address security, privacy concerns

IoT

Net-security

17.5.19

Data will be processed by edge computing in 59% of IoT deployments by 2025

IoT

Net-security

14.5.19

Sectigo Acquires IoT Security Firm Icon Labs

IoT

Securityweek

10.5.19

Hackers Take Over IoT Devices to ‘Click’ on Ads

IoT

Threatpost

9.5.19

New Samsung Exynos Chip Secures IoT Devices With Short-Range Comms

IoT

Securityweek

9.5.19

The IoT threat landscape is expanding rapidly, yet few companies are addressing third party risk factors

IoT

Net-security

7.5.19

Extinguishing the IoT Insecurity Dumpster Fire

IoT

Threatpost

7.5.19

Flaws in the design of IoT devices prevent them from notifying homeowners about problems

IoT

Net-security

6.5.19

A hacker has taken over at least 29 IoT botnets

BotNet  IoT

Securityaffairs

4.5.19

UK Publishes Proposed Regulation for IoT Device Security

IoT

Securityweek

30.4.19

2 Million IoT Devices Vulnerable to Complete Takeover

IoT

Threatpost

27.4.19

Millions of IoT Devices exposed to remote hacks due to iLnkP2P flaws

IoT

Securityaffairs

27.4.19

P2P Flaws Expose Millions of IoT Devices to Remote Attacks

IoT

Securityweek

25.4.19

IoT Security Firm VDOO Raises $32 Million

IoT

Securityweek

12.4.19

Enterprise IoT Security Firm Armis Raises $65 Million

IoT

Securityweek

11.4.19

Regulating the IoT: Impact and new considerations for cybersecurity and new government regulations

IoT

Net-security

3.4.19

Securing your home increasingly means securing all of your IoT devices

IoT

Net-security

30.3.19

IoT Attacks Escalating with a 217.5% Increase in Volume

IoT

Bleepingcomputer

30.3.19

Critical Rockwell Automation Bug in Drive Component Puts IIoT Plants at Risk

IoT

Threatpost

29.3.19

Microsoft Launches Azure Security Center for IoT

IoT

Securityweek

28.3.19

Security remains a top concern for IoT executives, but small fixes can shore up ecosystem resilience

IoT

Net-security

13.3.19

Federal Focus on Cyber Plays Out in President’s Budget, IoT Legislation

IoT

Threatpost

12.3.19

Medical IoT Devices with Outdated Operating Sytems Exposed to Hacking

IoT

Bleepingcomputer

8.3.19

RSAC 2019: For Domestic Abuse, IoT Devices Pose New Threat

IoT

Threatpost

8.3.19

IoT devices using CoAP increasingly used in DDoS attacks

IoT

Net-security

6.3.19

IoT automation platforms open smart buildings to new threats

IoT

Net-security

28.2.19

Researchers and businesses need to work together to expose IoT vulnerabilities

IoT

Net-security

26.2.19

Most IoT devices are being compromised by exploiting rudimentary vulnerabilities

IoT

Net-security

25.2.19

European Telecommunications Standards Institute Publishes New IoT Security Standard

IoT

Securityweek

21.2.19

Global mobile networks to support 12.3 billion devices and IoT connections by 2022

IoT

Net-security

20.2.19

European standards org releases consumer IoT cybersecurity standard

IoT

Net-security

15.2.19

Mozilla, Others Want Big Retailers to Pledge Minimum IoT Security

IoT

Securityweek

7.2.19

The problem with vulnerable IoT companion apps

IoT

Net-security

6.2.19

IoT Scale Flaws Enable Denial of Service, Privacy Issues

IoT

Threatpost

4.2.19

Extreme Networks Launches IoT Defense Solution For Enterprises

IoT

Securityweek

30.1.19

Japan to Hunt Down Citizens’ Insecure IoT Devices

IoT

Threatpost

29.1.19

Researchers Allege ‘Systemic’ Privacy, Security Flaws in Popular IoT Devices

IoT

Threatpost

23.1.19

Flaws in Moxa IIoT Product Expose ICS to Remote Attacks

IoT Securityweek

16.1.19

Companies still struggle to detect IoT device breaches

IoT

Net-security

15.1.19

As IoT Grows, Confidence in Security Remains Low

IoT

Securityweek

15.1.19

Widely used building access system can be easily compromised

IoT

Net-security

9.1.19

Worldwide spending on IoT to reach $745 billion in 2019

IoT

Net-security