Unsecured third-party IoT devices could pose major risks for organizations

Internet of things

According to new research, 97 percent believe unsecured IoT devices could be catastrophic for their organization, yet just 29 percent actively monitor for related third-party risks.

The study conducted by the Ponemon Institute and risk assurance body Shared Assessments shows 81 percent of respondents say that a data breach caused by an unsecured IoT device is likely to occur in the next two years.

Continue reading

Linux Foundation announces open source ACRN hypervisor for the Internet of Things

ACRN Project logo

The Linux Foundation has released details of one of its open source projects, ACRN -- a hypervisor designed for the Internet of Things and embedded devices. And, yes, it is pronounced "acorn".

The project was helped by contributions of code and engineering from Intel, and the aim was to create a system for managing virtual machines that was both flexible and small. With a Linux-based service OS, ACRN can run multiple guest operating systems at the same time, making it ideal for many scenarios.

Continue reading

Many smart devices can be hacked in 30 minutes

Network security

Off-the-shelf smart devices that include baby monitors, home security cameras, doorbells, and thermostats can be easily hacked according researchers at Israel's Ben-Gurion University of the Negev (BGU).

As part of their ongoing research into detecting vulnerabilities in devices and networks expanding in the smart home and Internet of Things (IoT), the BGU researchers disassembled and reverse engineered many common devices and quickly uncovered serious security issues.

Continue reading

Flaws could turn smart cameras into data-stealing spy tools

Spy key

Security vulnerabilities in some popular smart cameras, used as baby monitors and for security surveillance, could lead to them being exploited by hackers.

Research from Kaspersky Lab has found multiple issues with cameras, manufactured by Korean company Hanwha Techwin, that could allow attackers to obtain remote access to video and audio feeds from the cameras, remotely disable the devices and execute arbitrary malicious code on them.

Continue reading

Intel-sponsored study finds that smart cities save time

Skyscrapers in a smart city

A study sponsored by Intel has come to the rather unsurprising conclusion that smart cities save people time. The company says that major cities that have embraced the Internet of Things (IoT) can save each of their citizens up to 125 hours per year.

Being able to claw back more than five days over the course of a year seems too good to be true, but the study from Intel and Juniper Research appears to bear out the claim. The research looked at smart cities around the world, ranking them accordingly in the areas of mobility, health care, public safety and productivity.

Continue reading

Imaging systems present biggest security risk among connected medical devices

Cardiac monitor

A new report from IoT security specialist ZingBox looks at the security of connected medical devices, from infusion pumps and patient monitors to imaging systems and medical device gateways.

The most common types of risk originate from user practice issues (such as using embedded browsers on medical workstations to surf the web, conducting online chat or downloading content), accounting for 41 percent of all security issues.

Continue reading

Amazon buys smart doorbell and home security firm Ring for over $1 billion

Ring camera with an Amazon logo

Amazon has opened up its wallet and splashed more than $1 billion on buying Ring. Famed for its selection of smart doorbells, security cameras and other security devices, the purchase of the Santa Monica, California firm is Amazon's latest foray into home security.

While details of the deal are currently a little thin on the ground, it is expected that the Ring name will live on, and it is likely that future products released under the brand will feature Alexa smart assistant integration.

Continue reading

Why cybersecurity training is now everyone's responsibility in the era of IoT

security guards

We live in the Internet of Everything -- a world of convenience where connected devices can control our homes, our cars, medical devices and so much more. With Gartner projecting 21 billion devices connecting to the internet by 2020, the attack surface is unimaginably large, and the internet of things (IoT) is essentially a playground for cyber criminals. As we’ve seen time and again, hackers will exploit new and unknown vulnerabilities, and even discover old vulnerabilities hidden in IoT devices. At some point, their successful exploitations will result in a major catastrophe.

Our quality of life today has become absolutely dependent on the resilience of IoT. However, we continue to find vulnerabilities in smart home IoT devices, medical devices, connected cars, printers and more. We simply cannot keep up with the expanding attack surface, which makes it impossible to identify, monitor and manage the entire breadth of these devices. At the same time, we’re also facing a major skills shortage and talent gap in cybersecurity. By 2021, there will be over 3.5 million unfilled cybersecurity jobs, according to a recent Cybersecurity Ventures report.

Continue reading

Ericsson launches marketplace to unlock the cellular IoT ecosystem

IoT links

The IoT marketplace has grown, and is continuing to grow, at a rapid rate and this means developers and service providers have often struggled when it comes to collaboration with other networks and devices.

Communication services company Ericsson is using MWC 2018 to launch a new IoT Accelerator Marketplace aimed at making it easier for service providers to find IoT apps from the global ecosystem.

Continue reading

Wireless routers seen as essential as smart devices take off

The back of a Wi-Fi router with antenna mounted

The wireless router is the number one technology US consumers can’t live without for more than day, according to managed services provider iQor.

A working router is necessary for consumers to enjoy smart devices and the connected lifestyle, including smart TVs and streaming devices, multiplayer gaming, tablets, voice controlled virtual assistants and smart speakers, IoT-enabled security systems, and more. According to the survey 64 percent of US adults say they couldn’t be without Wi-Fi for a day.

Continue reading

New edge computing platform helps industry handle IIoT data

Industrial internet of things

Growing amounts of data from Industrial Internet of Things devices is placing increased strain on conventional network infrastructure.

One way of dealing with this is to move computing resources closer to the edge, and Stratus Technologies is launching a new virtualized and self-protecting edge computing platform that’s specifically designed for industrial environments.

Continue reading

Data threats are the new reality as organizations embrace transformative technologies

data threat

With 99 percent of organizations using big data, 94 percent Internet of Things devices, and 91 percent using or working on mobile payments, there are more attack surfaces than ever and new risks that need to be addressed.

A new study from systems and cyber security company Thales e-Security finds the extent and impact of increased threats clearly shown in levels of data breaches and vulnerability.

Continue reading

Security concerns and a move to edge computing, 2018 predictions for the IoT

IoT links

In 2017 we've see Internet of Things devices enter many more areas of our lives. We've also seen them exploited to launch cyber attacks.

So, how do industry experts think the IoT will develop in 2018?

Continue reading

Why the IoT needs wireless power

Wireless internet of things

With a predicted 200 billion connected devices in use by 2020, the Internet of Things is leading to a massive growth in the number of powered devices.

While this is a massive opportunity for manufacturers it's also a problem as all of those devices have to be kept powered up. Batteries are the current solution, but they're expensive, limit the design and life of a device, and contain nasty substances that are difficult to dispose of when they reach the end of their life.

Continue reading

ForeScout integrates with IBM to protect IoT devices

Internet of things

The increase in the number and variety of connected devices has made enterprise IT environments much more complex.

Maintaining security and compliance is a tricky problem and IoT security specialist ForeScout is integrating with IBM Security solutions to offer users stringer endpoint protection and automated risk mitigation.

Continue reading

Load More Articles