One third of IoT medical device makers attacked in the past 12 months – survey

One third of IoT medical device makers attacked in the past 12 months – survey

by Filip TRUTA, from IoT Security Insights , on 17.08.2017

Deloitte has audited 370 professionals in the medical device/IoT ecosystem to learn how often their companies' products are the subject of a cybersecurity incident. The responses were staggering: 35.6 percent said their organizations suffered a cybersecurity incident in the past year. Identifying cybersecurity risks associated with fielded and legacy connected devices, as well as mitigating ... The post One third of IoT medical device makers attacked in the past 12 months – survey appeared first on Bitdefender. read more

Developers: business leadership doesn’t understand tech

Developers: business leadership doesn’t understand tech

by Business Insights , on 17.08.2017

One doesn’t have to look far to see software is vulnerable, and who better to discuss the perceived state of software security than developers. With that in mind, Netsparker recently conducted a survey that looked at the views of developers on eactly this subject. read more

Companies to spend close to $100b on cyber security by 2018 – Gartner

Companies to spend close to $100b on cyber security by 2018 – Gartner

by Filip Truta, from Business Insights , on 16.08.2017

Organizations worldwide are on track to spend a cumulative $86.4 billion on information security products this year, a 7 percent increase over 2016, Gartner reports. The research firm anticipates that figure will climb to $93 billion in 2018. read more

DoS or How Hackers Can Cut Your Access to Devices or Services

DoS or How Hackers Can Cut Your Access to Devices or Services

by Ionut ILASCU, from IoT Security Insights , on 16.08.2017

Cyber attacks that aim to steal valuable information from a system require stealth to stay under the radar for as long as possible. Denial-of-service attacks are different and#8211; their noisy effects are impossible to miss, even though their origin may be unclear. Denial-of-service (DoS) strikes are almost as old as the internet. As their name ... The post DoS or How Hackers Can Cut Your Access to Devices or Services appeared first on Bitdefender. read more

Smart Locks Receive Bad Update; Hundreds Taken Offline

Smart Locks Receive Bad Update; Hundreds Taken Offline

by Ionut ILASCU, from IoT Security Insights , on 16.08.2017

A flubbed firmware update has regressed hundreds of smart door locks to their purely mechanical condition, depriving owners of the ability to remotely control the locking action. The adverse code affected the LS6i internet-connected lock model from manufacturer LockState, breaking the device's communication with the company servers. LockState, which is part of the Airbnb Host ... The post Smart Locks Receive Bad Update; Hundreds Taken Offline appeared first on Bitdefender. read more

Cyber Intruders Can Steal Data by Slipping In Unauthorized Requests

Cyber Intruders Can Steal Data by Slipping In Unauthorized Requests

by Ionut ILASCU, from IoT Security Insights , on 14.08.2017

Hackers have a wide arsenal of methods to compromise a device, and many of them target the code powering the gadget, rather than the poor security measures enforced by the user. Cyber intruders often use programming weaknesses to control or access the device, or steal information from it. File inclusion is an example of a ... The post Cyber Intruders Can Steal Data by Slipping In Unauthorized Requests appeared first on Bitdefender. read more

Get Ready for the Internet of Things—and the Inherent Security Threats

Get Ready for the Internet of Things—and the Inherent Security Threats

by Razvan Muresan, from Business Insights , on 14.08.2017

It’s safe to say that the concept of the Internet of Things (IoT) has progressed to the point where a growing number of organizations are exploring the opportunities. What might not be so safe is the IoT itself; security remains one of the biggest concerns and challenges of implementations. read more

Self-driving cars can be hacked with some stickers and a printer, researchers found

Self-driving cars can be hacked with some stickers and a printer, researchers found

by Luana PASCU, from IoT Security Insights , on 10.08.2017

Car hacking has never been easier, as a group of computer security researchers from University of Washington, University of Michigan Ann Arbor, Stony Brook University and University of California, Berkeley came up with a new attack method and#8211; road sign manipulation. Without displaying extraordinary hacking skills, anyone with a decent printer can apparently print at ... The post Self-driving cars can be hacked with some stickers and a printer, researchers found appeared first on Bitdefender. read more

UK drafts Data Protection Bill to stay on par with EU’s GDPR after Brexit

UK drafts Data Protection Bill to stay on par with EU’s GDPR after Brexit

by Filip Truta, from Business Insights , on 09.08.2017

Taking a leaf from the EU’s book on data protection, the United Kingdom is preparing to introduce a new law that will see it aligned with the General Data Protection Regulation (GDPR), to be on par with the rest of Europe after it is no longer a member of the union. read more

Next >>