Trending
Heat Index
IoT
Most Recent
 
Read More
March 11, 2017

Zero-day Conundrum: Keep or Disclose Vulnerability Stockpiles?

Business Should Move to an Incident Response Security Posture and Accept that Governments Will Maintain Stockpiles of Zero-days

With surprising concurrency, the RAND Corporation has published a lengthy study into zero-day exploits stockpiled by government just two days after WikiLeaks released its batch of documents on CIA hacking tools. While many have been surprised and even appalled that the government should maintain a stockpile of zero-day vulnerabilities and exploits, RAND seems to accept it as a matter of fact that all governments do so.

For the purpose of its research, “RAND obtained rare access to a dataset of information about zero-day software [...]

5319
 
Read More
November 3, 2016

Black Hat Europe: IoT devices can hack phones

The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.

Flaws in Belkin WeMo devices – electrical switches, cameras, light bulbs, coffee makers, air purifiers, etc. – enabled Invincea Labs researchers to not only hack into the devices, but to use that access to attack an Android phone running the app that controls the WeMo devices.

“This is the first instance we’ve seen of IoT hacking something else,” says researcher Scott Tenaglia, who pledges to look for other vulnerable devices that might be abused to carry out similar attacks.

MORE: CIO [...]

5910
 
Read More
March 22, 2016

Are you being watched?

The range and number of “things” connected to the internet is truly astounding, including security cameras, ovens, alarm systems, baby monitors and cars. They’re are all going online, so they can be remotely monitored and controlled over the internet.

Internet of Things (IoT) devices typically incorporate sensors, switches and logging capabilities that collect and transmit data across the internet.

Some devices may be used for monitoring, using the internet to provide real-time status updates. Devices like air conditioners or door locks allow you to interact and control them remotely.

Most people have a limited understanding of the security and privacy [...]

5516
 
Read More
January 19, 2016

Consumers become wary of security pitfalls in connected devices

We’re reaching the saturation point on smartphones, demand for tablets and TVs has turned sluggish, and people have grown concerned that connected devices (the so-called “Internet of Things”) may lay bare their personal data.

Those are the findings of a global survey of 28,000 consumers in 28 countries by management consulting company Accenture.

“The slowdown in the consumer technology market is irrefutable, serious, and global,” said Sami Luukkonen, the global managing director for the company’s Electronics and High Tech group, in a prepared statement. “The market is not about glitzy gadgets any more … As device demand tapers off, the industry needs to make a sharp [...]

8471
Watch Videos
 
Jens Erik Ebbesen: Innovation in Outsourcing
Innovation in outsourcing
 
Nearshore IT Services
 
ITOSDA Menu
Multi Sourcing: Supplier Integration
 
Hans Frolich
Mobility
 
Adam Harhoff
Sustainable Multi Sourcing
Join Nordic IT

Membership Application Type

SupplierBuyerOther

Newsletter Signup
Nordic IT Sourcing EVENTS
 
Read More
42155Nordic Cloud and Mobile Security Forum
 
Read More
11622IP EXPO Nordics
 
Read More
12608

error: Content is protected !!