Some IoT devices have no update capability whatsoever so it's important to focus more on software security; developed using best practices, tested for vulnerabilities, and able to ensure the authenticity and integrity of updates.
IoT devices in the dock as DDoS stages a resurgence, but stealth and sophistication also on the rise.
LG patches holes in its IOT device range following cooperation with CheckPoint, including patching vacuum cleaners which could have become digital spies in the home.
Reaper IOT botnet could be worse than Mirai suggest some commentators as it continues to evolve.
In recent conferences Europol has been teaming up with other organisations to ensure a joint law enforcement approach with Interpol to the darkweb and ransomware especially, and with ENISA to meet the challenge of IOT.
We can expect to see a cyber-security incident at a category one level within the next few years. The government specifying what it will buy is an effective way of changing the market - Ian Levy, technical director, NCSC
With the launch of iOS 11 and the Apple Watch, researchers note Apple's iOS 11 update included eight CVEs that patched vulnerabilities in iBooks, Mail MessageUI, Messages, MobileBackup, Safari, and Webkit.
Innovation in the IoT may be rapid, but security trails far behind. Nick Cook looks at why securing the IoT must be a priority, not an afterthought, and how collaborative action is fundamental to ensuring its successful future.
In our connected society, securing the network "hive" is very much a team effort. Only by assessing and defining the landscape in the first instance can a successful security strategy be put in place says Russell Crampin
Humans and machine learning will have to come together to test autonomous vehicles, and the idea of crash test dummy with an AI brain may soon become a very necessary reality.
The issue for home IOT devices is trust and ease of use says Kevin Cunningham, managing director at SQS, and perceived problems of the connected home, such as security issues and privacy issues, need to be addressed now.
A 13 year old hacker caught trying to build up botnet to hack CCTV cameras demonstrates that attacking IoT devices is literally child's play, thanks to widespread sharing of IoTmalware.
Alexa, Siri, Cortana and others virtual assistants could be subverted by inaudible sounds.
Botnets built exclusively from IoT devices have very much become a 'thing - thingbots - and they are now becoming a primary infrastructure for a future darknet according to a report from cybersecurity firm F5 Networks.
A review of Fuzz Testing results from various industries in 2016 showed the overall average time to first failure (TTFF) was 1.4 hours, meaning testers are taking less time to find vulnerabilities than in 2015.
A 29-year-old hacker has plead guilty in German court to an attack last year which downed internet service all across the country.
In Case You Missed It: IoT home vulnerability; Cyber attacks cost £40 bn; Bupa insider data leak; dual malware vectors; Dow Jones data at risk
It's clear that the IoT industry needs to step up, take charge and not place the burden of security at the consumer's doors.
Popular IoT home security device could allow hackers to turn burglar alarms on and off and switch on siren, says researcher who dissected it.
According to Darren Anstee, the Internet of Things (IoT) brings many capabilities both good and bad - but from a Distributed Denial of Service (DDoS) perspective it has provided attackers with a new, highly numerous population of devices to compromise.
Sanjay explores the core issues of IoT security, examining the similarities and differences between security IoT and securing other technologies.
With fitness trackers, smart TVs and even children's toys among the most vulnerable items, people are unaware that they're at serious risk of hacking.
A yet-indeterminate ransomware strain has infected systems all over the world with particular enthusiasm for Ukrainian targets.
The Japanese auto giant was hit with WannaCry ransomware on Sunday, forcing it to halt production of 1,000 cars.
For a more connected workplace, trusted identities can help organisations take a first step towards integrating building systems by securing, customising and enhancing IoT applications.
The massive Mirai distributed denial of service (DDoS) attack that took down Dyn DNS last fall knocking out dozens of high-profile websites could have been much worse if the malicious actors had done a bit more research.
A new piece of industrial control malware has emerged. Dubbed, Industroyer by its analysts, the piece spells trouble for industrial control systems.
Mathieu Chevalier discusses the ever-increasing number of IP-enabled devices being connected to our networks is a growing concern.
Apparently emanating from Iran, Persirai has been detected by researchers at Trend Micro linking more than 1,000 internet protocol (IP) camera models into a vast Internet of Things (IoT) botnet.
This year's Security & Counter Terror Expo put a fine point on the importance of cybersecurity as well as the need to integrate it with other disciplines.