The United Kingdom government has introduced new legislation designed to improve the security of “smart” internet-connected devices used in people’s homes. With all manner of Internet...
Most people familiar with computers and information technology know something about the Internet of Things (IoT) and probably own an IoT device or have seen it...
Agencies cannot stop hackers from targeting them. But we can—and should—develop risk management strategies. While serving as the chief information security officer for the U.S. Postal...
A zero-click vulnerability in a popular IoT security camera could allow an unauthenticated attacker to gain full access to the device and possibly internal networks, a researcher has...
IoT cyberattacks have been on a rise, and recently the attacks have increased to a massive scale. According to Kaspersky, the first six months of this...
The vast amount of data constantly collected by the billions of sensors and devices that make up the IoT can pose a serious processing challenge for businesses that...
Vulnerabilities collectively referred to as BrakTooth are affecting Bluetooth stacks implemented on system-on-a-chip (SoC) circuits from over a dozen vendors. The set of issues impact a...
Several zero-day vulnerabilities in a home baby monitor could be exploited to allow hackers access to the camera feed and plant unauthorized code such as malware. The security...
Guardicore has discovered a new attack vector on Comcast’s XR11 voice remote that would have allowed attackers to turn it into a listening device – potentially invading your...
In the wake of the Colonial Pipeline cyberattack and an ensuing Executive Order, a renewed focus is being given to the strength and resiliency of our...
Recent Comments