Security News

US NIST unveils winning encryption algorithm for IoT data protection
2023-02-08 19:45

The National Institute of Standards and Technology announced that ASCON is the winning bid for the "Lightweight cryptography" program to find the best algorithm to protect small IoT devices with limited hardware resources. The weak chips inside these devices call for an algorithm that can deliver robust encryption at very little computational power.

NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Devices
2023-02-08 17:18

The U.S. National Institute of Standards and Technology has announced that a family of authenticated encryption and hashing algorithms known as Ascon will be standardized for lightweight cryptography applications. "The chosen algorithms are designed to protect information created and transmitted by the Internet of Things, including its myriad tiny sensors and actuators," NIST said.

India-China relations will define the IoT landscape in 2023
2023-02-07 05:00

Tensions between two of the biggest producers of connected devices are coming to a head, and will be changing the IoT landscape in 2023. In recent months, India and China have faced off over their disputed border in the Himalayas.

Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices
2023-01-30 09:30

According to Palo Alto Networks Unit 42, the ongoing campaign is said to have recorded 134 million exploit attempts as of December 2022, with 97% of the attacks occurring in the past four months. What's more, 95% of the attacks leveraging the security shortcoming that emanated from Russia singled out organizations in Australia.

Securing IoT with Microsoft Defender for IoT sensors
2023-01-26 12:07

IoT hardware is at the heart of much modern operational technology, the systems that support businesses, the systems that mix modern IoT hardware with legacy control and data collection devices. So how can we protect our devices, networks and businesses, especially when we already have a large estate of deployed hardware? Microsoft's Defender for IoT is one option, adding network sensors and firmware analysis tools to help spot compromised and at-risk hardware and working in conjunction with Microsoft Sentinel to use machine learning to identify threats early.

Why most IoT cybersecurity strategies give zero hope for zero trust
2023-01-23 05:00

IoT remains the biggest hurdle in achieving an effective zero-trust security posture across an organization. In this Help Net Security video, Denny LeCompte, CEO at Portnox, discusses how IoT has been difficult to profile accurately and why zero trust strategies fail when applied to IoT. More about.

Study: Consumer security savvy is way behind IoT threat landscape
2022-12-20 18:22

With the rapid expansion of Internet-connected devices, both consumer and industrial, the cyber-threat landscape is growing faster than individuals' ability to keep up. Comcast's biennial take on consumer cyber health, the 2022 Xfinity Cyber Health Report, found that there are an average of 15 connected devices per household, up 25% from 2020 - with "Power users" having as many as 34.

Top industrial IoT security solutions
2022-12-13 17:17

Best industrial IoT security solutions FirstPoint Best for cellular IoT connectivity. FortiNAC is the network access control solution by Fortinet, which provides security for networks with IoT. Its security capabilities protect networks against IoT threats, enable control of third-party devices and come with automatic features that respond to different security-related stimuli.

How IoT is changing the threat landscape for businesses
2022-12-08 05:00

Where IoT-enabled devices connect to wider networks, their potential functionalities are immense, with countless applications across various industries, including production and manufacturing,...

New Go-based Botnet Exploiting Exploiting Dozens of IoT Vulnerabilities to Expand its Network
2022-12-07 04:03

A novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage of nearly two dozen security vulnerabilities in the internet of things devices and other software. The botnet "Contains several modules, including self-replication, attacks for different protocols, and self-propagation," Fortinet FortiGuard Labs researcher Cara Lin said.