Security News
A set of seven vulnerabilities collectively tracked as Access:7 have been found in PTC's Axeda agent, a solution used for remote access and management of over 150 connected devices from more than 100 vendors. Developed by Parametric Technology Corporation, the Axeda platform through locally deployed agents provides telemetry data from IoT devices on the network and the option for remote service.
The global 5G IoT market size was valued at $1.4 billion in 2020 and is projected to reach $111.2 billion by 2028, growing at a CAGR of 72.1% from 2021 to 2028, according to Verified Market Research. Rising demand for IoT connected devices, more adoption of mobile broadband as well as a growing device-to-device communication, and swift innovation virtualization in the networking domain is driving the growth of the 5G Technology Market.
The annual barometer of industry perceptions and intentions around IoT security surveyed 1,038 technology decision makers across Europe, USA, and APAC, and signals a positive turning point for security with organizations placing it at the center of IoT strategy and organizational culture. Despite almost universal acceptance that IoT security commands a premium, nearly a third of those asked identified cost as inhibiting them from implementing stronger security, while perceived expense and a lack of ROI were the biggest barriers to conducting external lab testing.
As NIST research shows security flaws continue to pile up, this haphazard approach will surely catch up to teams who rely exclusively on responsive rather than proactive security strategies. In the past, IoT security considerations were far too often overlooked in the name of increasing speed to market and reducing costs - security was at most a box to be checked at the end of development.
The IoT in manufacturing market 2021 value stood at an estimated $62.1 billion, and it will increase to $200.3 billion by 2030, at a 13.9% CAGR between 2021 and 2030, according to P&S Intelligence. To further enhance the IoT solutions in use, industrialists are deploying artificial intelligence to analyze the data generated by IoT sensors in real time and make sound decisions.
The current device discovery solutions have been mainly focused on identifying and monitoring servers, workstation PCs, laptops and infrastructure devices such as network firewalls, switches and routers, because the most valuable information assets of organizations are being stored, processed and transferred over those devices, hence making them the prime target of security breaches and intrusions. Accurate identification of connected device manufacturer, model name, device type, device end of life status, firmware version, and firmware release date.
The global IoT in smart cities market size to grow from $130.6 billion in 2021 to $132.2 billion by 2026, at a Compound Annual Growth Rate of 19.0 % during the forecast period, according to ResearchAndMarkets. The service segment in the IoT in smart cities market to have a higher CAGR. The services segment in the IoT in smart cities market is expected to grow, as major players are focused on offering services.
35% of the growth will originate from North America for the IoT data management market. The IoT data management market is expected to grow by $94.79 billion from 2021 to 2026.
Electromagnetic emanations can be recorded and used to detect and identify malware running on IoT devices, a group of researchers working at IRISA have proven. This novel malware detection approach also offers additional advantages: as no specific software has to be installed on the monitored device, it can hardly be detected by the malware and evaded by the malware authors.
Cybersecurity researchers have proposed a novel approach that leverages electromagnetic field emanations from the Internet of Things devices as a side-channel to glean precise knowledge about the different kinds of malware targeting the embedded systems, even in scenarios where obfuscation techniques have been applied to hinder analysis. With the rapid adoption of IoT appliances presenting an attractive attack surface for threat actors, in part due to them being equipped with higher processing power and capable of running fully functional operating systems, the latest research aims to improve malware analysis to mitigate potential security risks.