A security expert who hooked up an internet-connected surveillance camera for research purposes reported via Twitter on Friday that the device was compromised by IoT malware after just 98 seconds of being online.
Over a third of Brits are planning to gift an internet-connected device this Christmas. The two most popular gifts - smartphone/tablets and laptops - this year are also the two most easily and frequently hacked.
A research team has set up a chain reaction attack that would take over Philips Hue smart lightbulbs across entire cities
An researcher spotted threat actors actively updating and customising the Mirai botnet source code that was leaked less than two weeks ago.
Over the past year, the number of job postings in the UK for positions requiring skills in Internet of Things (IoT) related technologies has increased by 70 percent - and that's just the tip of the iceberg.
According to John Matherly - internet cartographer, security gadfly and founder of IoT-search engine Shodan - the internet of connected things is very much here to stay.
A large scale DDoS attack, carried out by a botnet of hacked Internet of Things devices, many of which were made by Chinese firm Xiongmai has now prompted a product recall.
DDoS attacks using IOT botnets take down parts of the internet delivering Twitter, Spotify, Netflix, GitHub, Amazon and Reddit among others.
Since the source code to the Mirai IoT botnet was publicly leaked, researchers at Imperva have uncovered evidence of several low-level DDoS attacks that were likely perpetrated by new users testing out this suddenly accessible tool.
"Where bits and bytes meet flesh and blood" was the main area of concern for industry panelists, ranging from Critical Infrastructure - where strict controls may be impossed, to consumer IOT goods - where they can't.
A number of vulnerabilities found in an industrial automation device could allow hackers to take control of machinery.
Over the weekend, the source code of the Trojan which used huge numbers of IoT devices to form a botnet and attack the websites of security blogger Brian Krebs and European web hosting company OVH, with a DDoS attack was released online.
Andy Taylor discusses how CIOs can tackle the problems with IoT security and what precautions they could be taking.
Eight brands of IoT home routers were compromised and used to create botnets that launched an application-level DDoS attack against a website's multiple servers.
Critical Infrastructure is now at risk. Transport, finance and utilities are all targets. Graham Mann looks at some key issues and how they can be tackled.
The top three findings from Trend Micro's TrendLabs six-monthly threat trends are the doubling of ransomware families, geographic spread of business email scams and increasing Flash and IOT vulnerabilities spotted.
Security companies appear to have woken up to the IoT threat, as Bullguard acquires "Security of Things" company Dojo Labs and F-Secure launches an IoT security monitor.
Insurance firm Zurich is offering a discount on monthly insurance fees should a customer use the IoT alarm offered by Cocoon, despite security concerns over IoT devices.
Information and data experts at IHS Markit are reporting exponential growth of video doorbells which are outpacing conventional video door phones. But are they safe?
The Guardian Project has integrated Tor security into the Internet of Things (IoT), creating a Tor Onion Service Configuration for the Home Assistant open source platform.
Researchers have proven that sensors in wearable electronics can be exploited to measure minute movements in users' arms in an effort to decipher keystrokes and PIN codes that they enter into computers and ATMs.
Lizard Squad's LizardStresser botnet rising in popularity as hackers and cyber-criminals increasingly look to it as a way of assimilating IoT devices for later DDoS attacks
From nuclear power stations to cars, 'Things' are increasingly vulnerable to attack. Greater adoption of security best practices is needed says Mark Kedgley, who urges more building-in security to devices and how they use the internet.
Eighty-nine percent of UK organisations feel somewhat or more vulnerable than they have been in the past to internal and external threats to sensitive data.
Cesare Garlati says having a device rendered useless because of a shut down in cloud service highlights the need for open standards in IoT devices.
Screens on a vital medical monitor went blank in the middle of a heart procedure in the US - officials blame human error for misconfigured AV software.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- The information security implications of M&A deals
- Cyber-security must reflect risk not just regulation
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success