Israel-based Cellebrite reportedly privately announced the capability to subvert the security of iOS 11 enabled devices including the latest iPhone, iPad, iPad mini, iPad Pro and iPod touch.
The French government has floated a proposal to make manufacturers of internet-connected devices liable for the security of their devices while they are on the market.
Cyber-attacks against IoT devices have grown markedly over the past two years, prompting a warning from Interpol that nearly any IoT device - from refrigerators to smartphones - is vulnerable to attack.
Drive-by cryptomining campaigns were spotted targeting millions of Android devices via infected apps and malicious browser redirects.
Malicious cryptominers are going mobile and beyond with a new botnet malware targeting Android-based devices that expose debug capabilities to the internet, for the purpose or mining Monero.
Amazon is issuing a security patch for its "Key"services shortly after a researcher posted a video demonstration of them claiming to hack the Amazon device using a Raspberry Pi.
Security researchers have found a new botnet that uses flaws connected to the Satori botnet and uses hosting services running multiplayer versions of Grand Theft Auto to infect IoT devices.
Autosploit, a new tool that basically couples Shodan and Metasploit, makes it easy for even amateurs to hack vulnerable IoT devices.
Nexus Zeta behind botnet that weaponises router exploit to enlist further vulnerable IoT devices. The author of Satori botnet may also be behind two new Mirai variants called Masuta and PureMasuta.
An emerging botnet comprised of compromised IoT devices dubbed "Hide 'N Seek" or HNS is using custom built Peer-to-Peer communication to exploit victims and build its infrastructure.
Three Sonic the Hedgehog games for Android devices that collectively have been downloaded well over a hundred million times are leaking users' geolocation and device data to uncertified servers.
A pair of flaws dubbed Meltdown and Spectre that take advantage of the speculative execution performance feature in modern CPUs make the memory of virtually all computers and devices accessible to hackers.
The code that exploits a flaw in Huawei, a router that enables these devices to be turned into botnets to push Satori and Brickerbot has been publicly posted on Pastebin.
Unlike Mirai, the IoTroop bot exploits nine core vulnerabilities as it spreads, and already, experts say those responsible for the bot - who remain unknown - have added more than 100 features to it.
A serious vulnerability in Android could put millions of devices at risk from attackers modifying code in applications without affecting their signatures.
Seven in ten people in the UK are being put off recycling old and unused electrical products because of concerns about personal security data breaches.
Rémy Cointreau faced a challenge to create a more agile organisation through its IT infrastructure, providing employees with the ability to securely access applications from any device at any time and from anywhere.
Trustwave researchers revealed a vulnerability in Brother consumer and business printers and multi-function devices that can allow a denial of service attack. Brother UK responds.
LG patches holes in its IOT device range following cooperation with CheckPoint, including patching vacuum cleaners which could have become digital spies in the home.
Popular IoT home security device could allow hackers to turn burglar alarms on and off and switch on siren, says researcher who dissected it.
Actionable information and low-friction tools for users can get devices into a more secure state without heavy-handed policy enforcement.
Phishing scams and ransomware attacks may be grabbing the headlines, but for the financial sector lost or stolen mobile devices were the leading cause of data breaches over the last decade.
Christophe Jolly of Cisco France took the stage at FIC 2016 to outline the fundamental security problems in the looming "internet of everything".
As this year's Slush conference opens, securing The Internet of Things has become a hot topic with many of the exhibiting companies tackling the issue head on.
When the UK's Data Protection Act (DPA) was instigated in 1998 almost all data was generated, consumed and stored on company owned and managed equipment.
The department for Business, Innovation and Skills (BIS) has lost 83 smartphones and 17 laptops over the past five years.
The challenge of hyper-connected devices and the 'internet of things' will see billions of devices connected by the end of this decade, and all need to be secured.