A set of nine vulnerabilities are currently exposing roughly 100 million devices worldwide, according to researchers. The vulnerabilities lie in the basic code that dictates how devices communicate with the internet. What cybersecurity researchers are questioning is how to implement changes and effective defenses that will actively combat these types
House lawmakers on Thursday introduced bipartisan legislation that seeks to require the Federal Communications Commission to capture and maintain data on the growing use of 5G enabled devices. The solicitation also looks to determine the amount of electromagnetic spectrum needed to support future demands. The legislation was introduced by Representatives
Internet of Things and Wi-Fi vendor Ubiquiti discovered a breach of one of its systems in the cloud yesterday. THe customers were advised to change their passwords and use multifactor authentication. There is no evidence of breaching of any databases that contain personal information of users. The data that could
The megatrends of Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, IoT and Cybersecurity are interacting together in ways that will deliver great new capabilities to the enterprise. But there are risks as well. Studying the future of these megatrends will help enterprises make optimal decisions today.
This video provides a concise overview of these trends and concludes with actionable recommendations.
According to a threat report published by SonicWall in the middle of 2020, malware attacks declined by 24% globally in the first half of the year. However, the report also states that IoT attacks and ransomware attacks have increased, with the US experiencing a huge 109% jump in the number
The phrase Internet of Things (IoT) is a useful way to force thoughts on the new architecture emerging around embedded computing and ubiquitous communications. IoT devices are with us now and are proliferating at home, in our cars, on trains, planes, cities, buildings are factories. There are many design choices we all need to make to optimize how IoT serves our businesses. This succinct guide to IoT is meant to help you think through just that.
A new botnet is reportedly actively targeting IoT devices through the use of payloads compiled for a dozen CPUs. The botnet uses these payloads to launch different types of DDoS attacks and spread malware. The botnet has been named the Dark Nexus by researchers at Bitdefender after they discovered it
Security researchers with AV-TEST have discovered several major security vulnerabilities in a cheap smart watch for children made in China.The flaws in the watch and the accompanying mobile app exposed the location information of 5,000 children as well as the personal data of 10,000 parents. According to AV-TEST CEO Maik
A recent Neustar survey reveals that while 48% pf organizations suffered a cyberattack targeting their Internet-of-things (IoT) devices last year and nine in ten are worried about future threats of this kind, only 47% have implemented a plan for responding to such attacks. 38% of firms are developing a plan
A new report by Bitdefender underscores the security risks involved with Internet-of-things (IoT) devices. Earlier this year, researchers with the firm discovered that Amazon Ring smart doorbells leak the Wi-Fi password of the home network they are connected to, allowing threat actors to capture the credentials and use then to