Security News

An overwhelming number of IT security professionals (85%) see a cyberattack on critical infrastructure happening in the next five years. Pwnie Express CEO Todd DeSisto says that figure is perhaps...

Asif Effendi of GE Oil and Gas Offers Risk Mitigation InsightsThe industrial internet of things presents a significant new risk paradigm, says Asif Effendi of GE Oil and Gas, who offers threat...

Less than a month after Microsoft announced an operating system read more

A group of researchers have devised a self-learning system for detecting compromised IoT devices that does not require prior knowledge about device types or labeled training data to operate. “We...

A long, long time ago, nearly 4,000 years, in a land far, far away ancient cryptography was born. The Place? Egypt. It is there historians believe the technique was invented by priests as a...

In 2017 Internet of Things (IoT) devices rose to prominence as attackers have continued to target and use them to support various cyberattacks. IoT devices are almost the perfect target for...

What a timely way to end this series on Threat Modeling the Internet of Things (IoT). An advanced thingbot, nicknamed Reaper (or IoTroop), was recently discovered infecting hordes of IoT devices....

The EU Cybersecurity Agency ENISA published a report on the security of the Internet of Things (IoT). The study aims to set the scene for IoT security in Europe. It serves as a reference point in...

For the first time, one of the largest cyber security conferences in the ASEAN region, the Singapore Internet CyberSecurity Week (SICW), had a track devoted just to the Internet of Things. One...

About the authors Shancang Li is a senior lecturer in the cyber security research unit, Department of Computer Science and Creative Technologies at University of the West of England, Bristol, UK....