Internet of Things


492 articles

Malware

Is “Malware of Mass Disruption” the WMD of the future? Insights from the stage at RSA 2018

Is “Malware of Mass Disruption” the WMD of the future? Insights from the stage at RSA 2018

Malware

Is “Malware of Mass Disruption” the WMD of the future? Insights from the stage at RSA 2018

ESET's Global Security Evangelist Tony Anscombe expands on his theory

Editor26 Apr 2018


Malware

Firms using WebEx at risk of poisoned Flash attacks

Firms using WebEx at risk of poisoned Flash attacks

Malware

Firms using WebEx at risk of poisoned Flash attacks

Companies should check they are running latest version of WebEx, and beware attacks via the road less travelled.

Graham Cluley23 Apr 2018


Internet of Things

RSA 2018: IoT security comes of age

RSA 2018: IoT security comes of age

Internet of Things

RSA 2018: IoT security comes of age

IoT security may have finally turned the corner towards a more secure future.

Cameron Camp20 Apr 2018


Internet of Things

Global police test their cyber-chops in simulated IoT attack

Global police test their cyber-chops in simulated IoT attack

Internet of Things

Global police test their cyber-chops in simulated IoT attack

More than three dozen cybercrime and digital forensics experts from 23 countries have investigated a simulated attack on a bank that had been carried out through an IoT device.

Tomáš Foltýn05 Mar 2018


How To, Internet of Things

How to start analyzing the security of your IoT devices

How to start analyzing the security of your IoT devices

How To, Internet of Things

How to start analyzing the security of your IoT devices

The big challenge with IoT devices is that they are all different: Each manufacturer has its own firmware, uses different protocols, and designs its own architecture. So, the first step before carrying out any analysis is to understand the architecture, find out what components are involved, and how they interact and communicate among themselves.

Cecilia Pastorino02 Mar 2018


Internet of Things

Privacy by Design: Can you create a safe smart home?

Privacy by Design: Can you create a safe smart home?

Internet of Things

Privacy by Design: Can you create a safe smart home?

The Internet of Things (IoT) can be a network of connected convenience but this should not come at the expense of safeguarding your privacy and the personal data that connected devices collect and share.

Tony Anscombe26 Feb 2018


Internet of Things

How safe are you around your smart TV?

How safe are you around your smart TV?

Internet of Things

How safe are you around your smart TV?

Smart TVs afford us the opportunity to use them for purposes that are more commonly associated with computers. In fact, that’s what these TVs have become – internet-connected ‘computers’, much like mobile phones. It would no doubt help if we thought of them as such and treated them accordingly.

Tomáš Foltýn14 Feb 2018


Internet of Things

MADIoT – The nightmare after XMAS (and Meltdown, and Spectre)

MADIoT – The nightmare after XMAS (and Meltdown, and Spectre)

Internet of Things

MADIoT – The nightmare after XMAS (and Meltdown, and Spectre)

It is not feasible, in fact not even possible, to replace all CPUs in all devices. It would be too costly, besides the success rate for unsoldering and resoldering pin-throughs in multi-layer boards will never be 100%.

Righard Zwienenberg08 Jan 2018


Malware

ESET malware researchers awarded prize in open-source memory forensics competition

ESET malware researchers awarded prize in open-source memory forensics competition

Malware

ESET malware researchers awarded prize in open-source memory forensics competition

The Volatility Foundation, the non-profit organization behind the Volatility Framework, sponsors the yearly Volatility Plugin Contest to acknowledge the best forensic tools built on the Volatility platform.

Editor29 Nov 2017