There are a number of perks to giving the system the Internet of Things (IoT) treatment, but security concerns abound.
Internet of Evil Things Lurks in Corporate Networks
With more than 16 billion connected devices now deployed, rogue or unauthorized devices could be operating, undetected, across networks.
(ISC)2 Expands Operations in the National Capital Region
The expanded corporate presence reflects the large member concentration that the organization has in the Washington, D.C. area.
Log-in Stealing Attack Builds on 18-Year-Old Flaw
Redirect to SMB could give MITM attackers keys to the kingdom
China Pegged for Long-Running APT 30 Attack Group
Southeast Asia-focused group jumped air gaps to steal info
Moto Modem Flaws Could Give Attackers Full Control
Combination of vulnerabilities is bad news for home internet users
SendGrid Used to Attack Coinbase Bitcoin Exchange
SendGrid offers an easy path to target-rich environments for phishing artists—and Bitcoin is a popular end game.
Georgia Tackles Critical Infrastructure Attacks
A fictional utility and its three power, water and gas subsidiaries will be the subject of four hybrid cyber/physical attacks.
SANS Reveals Insider Threat Security Gaps
IT security pros have poor visbility into the problem, according to institute
Upgrade iOS Now to Avoid Phantom Flaw, Say Researchers
New vulnerability fixed in iOS 8.3 could brick handsets