Speaking at The Symposium on Security for Asia Network (SyScan) in Singapore, Rob Miller, senior security consultant at MWR InfoSecurity, has detailed how to build LoRa systems that are provably secure against cyber-attack.
Vectra® Networks, reports that the Vectra Threat Labs™ has verified that consumer-grade Internet of Things (IoT) products, such as Wi-Fi security web cameras, can be hacked and reprogrammed to serve as permanent backdoors.
Vectra® Networks has announced that the Vectra Threat Labs™ has verified that consumer-grade Internet of Things (IoT) products, such as Wi-Fi security web cameras, can be hacked and reprogrammed to serve as permanent backdoors, enabling potential attackers to remotely command and control a cyber attack without being detected by traditional security products.
It should come as no surprise that Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) that control key functions in critical infrastructure are especially at risk of cyber attack. If saboteurs manage to compromise critical infrastructure services, a country’s economy and military defenses can be severely hampered.
According to several IoT industry analysts, IT security professionals are not confident that they can prevent cyber-attacks on the Internet of Things. Not only do companies still need to get their data security houses in order, the market for data security products is frustratingly being described by one analyst firm as “immature”. Jeremy Cowan reports.
Blog — This is the third post in a multi-part series of blogs by Bill Zujewski, which specifically explores the challenges of dealing with wireless technology as part of an M2M (Machine-To-Machine) initiative. The series offers insights to help designers and developers prepare for and overcome the unique challenges involved with implementation. Today’s post focuses on security risks.
Armonk, New York, USA: IBM (NYSE: IBM) has agreed to acquire privately held Q1 Labs, a Waltham, Massachusetts-based provider of security intelligence software. The move aims to accelerate IBM’s efforts to secure its clients’ enterprises more intelligently by applying analytics
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.