Security News

IoT device origin matters more than ever
2022-11-30 06:00

In this context, device buyers should consider where their devices come from and regional regulations. Let's look at why the origin of connected devices today matters more than ever.

Over a Dozen New BMC Firmware Flaws Expose OT and IoT Devices to Remote Attacks
2022-11-28 10:07

Over a dozen security flaws have been discovered in baseboard management controller firmware from Lanner that could expose operational technology and internet of things networks to remote attacks. BMC refers to a specialized service processor, a system-on-chip, that's found in server motherboards and is used for remote monitoring and management of a host system, including performing low-level system operations such as firmware flashing and power control.

Over a Dozen New BMC Firmware Flaws Expose OT and IoT Devices to Remote Attacks
2022-11-28 10:07

Over a dozen security flaws have been discovered in baseboard management controller firmware from Lanner that could expose operational technology and internet of things networks to remote attacks. BMC refers to a specialized service processor, a system-on-chip, that's found in server motherboards and is used for remote monitoring and management of a host system, including performing low-level system operations such as firmware flashing and power control.

Top 6 security risks associated with industrial IoT
2022-11-23 10:15

Although there are plenty of use cases for industrial IoT solutions, there are security risks associated with the technology. Device hijacking is one of the common security challenges of IIoT. It can occur when the IoT sensor or endpoint is hijacked.

6 ways to reduce your IoT attack surface
2022-11-07 09:46

In our own analysis of millions of IoT devices deployed in corporate environments, we have found that both high-risk and critical vulnerabilities are widespread. Half of all IoT devices have vulnerabilities with a CVSS score of at least 8, and 20% have critical vulnerabilities with a CVSS score of 9-10. If a company doesn't even know which devices are on its network, how can it possibly defend them from attack or protect its IT network from lateral movement after a successful IoT breach?

IoT cybersecurity is slowly gaining mainstream attention
2022-11-03 06:00

IoT has been part of our reality for quite some time, but what about the security of these devices? Is it becoming a priority? We've seen the concern and prioritization of IoT security growing, this is due both to the growing popularity of these devices and the push we are seeing from the public sector to strengthen America's cybersecurity.

3 inexpensive steps to secure IoT
2022-11-01 11:30

Common IoT devices include security cameras, industrial lighting systems, and manufacturing controllers managed by a web-based solution. Some commonly overlooked IoT devices include multi-function printers, security scanners, and inventory scanners.

How to navigate the current 5G and IoT threat landscape
2022-10-24 14:15

Current challenges and risks entailing 5G / IoT. A key differentiation between 5G and its predecessor networks is that 5G entails an untrusted core network between the subscriber end and the unified data management environment, whereas predecessor networks had a hierarchical trust model. A 2021 report by the Cybersecurity and Infrastructure Security Agency regarding Potential Threat Vectors to 5G Infrastructure listed supply chain risks as a particularly dangerous threat in the 5G space.

Cloudflare shows flair with new products for mobile and IoT security
2022-10-03 12:50

Cloudflare shows flair with new products for mobile and IoT security. Cloudflare holds the view that while corporate organizations have made moves to deploy zero-trust security solutions at the software level of their desktops, mobile devices have not received similar attention.

Embedded IoT security threats and challenges
2022-09-29 05:30

IoT embedded systems combine hardware, firmware, and internet connectivity to carry out particular functions. These devices transfer real-time data via the internet for various purposes, including tracking, monitoring, and analysis.