Government plans for IOT security welcomed but also criticised as being only a set of advisories and recommendations which do not include watertight regulations around credentials and authentication.
If devices are shipped with the low-hanging fruit problems removed, security becomes a consumer requirement, which will lead hardware vendors to guarantee a baseline level of security.
Cyber-attacks against IoT devices have grown markedly over the past two years, prompting a warning from Interpol that nearly any IoT device - from refrigerators to smartphones - is vulnerable to attack.
Mirai and Satori show the potential malicious actors can have when armed with malware and lots of unsecured IoT connected devices to target.
Several Smart TVs from Samsung and others using the Roku TV platform, as well as media players from that company, are susceptible cyber-attacks, according to Consumer Reports, a claim denied vehemently by Roku.
Autosploit, a new tool that basically couples Shodan and Metasploit, makes it easy for even amateurs to hack vulnerable IoT devices.
Nexus Zeta behind botnet that weaponises router exploit to enlist further vulnerable IoT devices. The author of Satori botnet may also be behind two new Mirai variants called Masuta and PureMasuta.
An emerging botnet comprised of compromised IoT devices dubbed "Hide 'N Seek" or HNS is using custom built Peer-to-Peer communication to exploit victims and build its infrastructure.
IoT is part of a fundamental shift forward in enterprise networking - towards a cloud-enabled 'consume' approach - and yet most companies plan to implement IoT in a way that parallels an outdated way of 'DIY' networking.
With more devices able to connect directly to the web, the IOT s continuously expanding. However, cans of worms are waiting to be opened, including data loss, data manipulation and unauthorised access to devices.
As IoT botnet attacks continue to grow in size and effectiveness in 2018, the damage they cause will force the IoT manufacturing industry to add stronger security to their products.
Some IoT devices have no update capability whatsoever so it's important to focus more on software security; developed using best practices, tested for vulnerabilities, and able to ensure the authenticity and integrity of updates.
IoT devices in the dock as DDoS stages a resurgence, but stealth and sophistication also on the rise.
LG patches holes in its IOT device range following cooperation with CheckPoint, including patching vacuum cleaners which could have become digital spies in the home.
Reaper IOT botnet could be worse than Mirai suggest some commentators as it continues to evolve.
In recent conferences Europol has been teaming up with other organisations to ensure a joint law enforcement approach with Interpol to the darkweb and ransomware especially, and with ENISA to meet the challenge of IOT.
We can expect to see a cyber-security incident at a category one level within the next few years. The government specifying what it will buy is an effective way of changing the market - Ian Levy, technical director, NCSC
With the launch of iOS 11 and the Apple Watch, researchers note Apple's iOS 11 update included eight CVEs that patched vulnerabilities in iBooks, Mail MessageUI, Messages, MobileBackup, Safari, and Webkit.
Innovation in the IoT may be rapid, but security trails far behind. Nick Cook looks at why securing the IoT must be a priority, not an afterthought, and how collaborative action is fundamental to ensuring its successful future.
In our connected society, securing the network "hive" is very much a team effort. Only by assessing and defining the landscape in the first instance can a successful security strategy be put in place says Russell Crampin
Humans and machine learning will have to come together to test autonomous vehicles, and the idea of crash test dummy with an AI brain may soon become a very necessary reality.
The issue for home IOT devices is trust and ease of use says Kevin Cunningham, managing director at SQS, and perceived problems of the connected home, such as security issues and privacy issues, need to be addressed now.
A 13 year old hacker caught trying to build up botnet to hack CCTV cameras demonstrates that attacking IoT devices is literally child's play, thanks to widespread sharing of IoTmalware.
Alexa, Siri, Cortana and others virtual assistants could be subverted by inaudible sounds.
Botnets built exclusively from IoT devices have very much become a 'thing - thingbots - and they are now becoming a primary infrastructure for a future darknet according to a report from cybersecurity firm F5 Networks.
A review of Fuzz Testing results from various industries in 2016 showed the overall average time to first failure (TTFF) was 1.4 hours, meaning testers are taking less time to find vulnerabilities than in 2015.
A 29-year-old hacker has plead guilty in German court to an attack last year which downed internet service all across the country.
In Case You Missed It: IoT home vulnerability; Cyber attacks cost £40 bn; Bupa insider data leak; dual malware vectors; Dow Jones data at risk
It's clear that the IoT industry needs to step up, take charge and not place the burden of security at the consumer's doors.
Popular IoT home security device could allow hackers to turn burglar alarms on and off and switch on siren, says researcher who dissected it.