Security News
MIT researchers have developed a system that could bring deep learning neural networks to new - and much smaller - places, like the tiny computer chips in wearable medical devices, household appliances, and the 250 billion other objects that constitute the IoT. The system, called MCUNet, designs compact neural networks that deliver unprecedented speed and accuracy for deep learning on IoT devices, despite limited memory and processing power. IoT devices often run on microcontrollers - simple computer chips with no operating system, minimal processing power, and less than one thousandth of the memory of a typical smartphone.
CyberArk announced it is working with Forescout and Phosphorus to enable organizations to secure the increasing number of IoT devices and technologies resulting from digital business transformation. Customers can significantly reduce risk using the joint integration to continuously discover, secure and manage IoT devices connected to corporate networks.
Security stalwarts praised the bill's alignment with existing standards and best practices, as well as its meaning for IoT devices - which have long been plagued by security and privacy issues. The IoT Cybersecurity Improvement Act has several different parts.
The IoT Cybersecurity Improvement Act, a bill that aims to improve the security of Internet of Things devices, passed the Senate on Tuesday and is heading to the White House for the president's signature. Sen. Gardner commented, "I applaud the Senate for passing our bipartisan and bicameral legislation to ensure the federal government leads by example and purchases devices that meet basic requirements to prevent hackers from accessing government systems."
The vast number of Internet-of-Things devices are proving to be lucrative for botnet operators to carry out various attacks - from sending spam to launching harmful distributed denial-of-service attacks, according to Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs. Manky said he's seen an increase in a number of botnets made up of compromised IoT devices, which can be attributed to various factors.
Chen Ku-Chieh, an IoT cyber security analyst with the Panasonic Cyber Security Lab, is set to talk about the company's physical honeypot and about the types of malware they managed to discover through it at HITB CyberWeek on Wednesday. The use of IoT is increasingly widespread, from home IoT, office IoT to factory IoT, and the use of automation equipment is increasing.
As organisations cannot always control the security measures of their supply chain partners, IoT supply chains have become a weak link for cybersecurity. "Securing the supply chain of ICT products and services should be a prerequisite for their further adoption particularly for critical infrastructure and services. Only then can we reap the benefits associated with their widespread deployment, as it happens with IoT," said Juhan Lepassaar, Executive Director, ENISA. In the context of the development of the guidelines, ENISA has conducted a survey that identifies the existence of untrusted third-party components and vendors, and the vulnerability management of third-party components as the two main threats to the IoT supply chain.
Researchers have uncovered a new worm targeting Linux based x86 servers, as well as Linux internet of things devices. Of note, the malware utilizes GitHub and Pastebin for housing malicious component code, and has at least 12 different attack modules available - leading researchers to call it "Gitpaste-12." It was first detected by Juniper Threat Labs in attacks on Oct. 15, 2020.
The global number of industrial IoT connections will increase from 17.7 billion in 2020 to 36.8 billion in 2025, representing an overall growth rate of 107%, Juniper Research found. The research identified smart manufacturing as a key growth sector of the industrial IoT market over the next five years, accounting for 22 billion connections by 2025.
Smartphones and the rise of IoT. Relying on the ubiquity of smartphones and the rise of remote controls, users and vendors alike have embraced the move away from physical device interfaces. The communication between an IoT device and its app is often not properly encrypted nor authenticated - and these issues enable the construction of exploits to achieve remote control of victim's devices.