Even though thousands of smart devices are being regularly connected to enterprise networks, many organisations do not have security policies for connected devices, or their employees do not follow existing policies by the book.
The ISO has brought together a team of privacy experts to develop the first set of preventative international guidelines to ensure consumer privacy is embedded into the design of a product or service.
Security researchers have discovered a new form of the Hide and Seek IoT malware. The latest version can now survive a reboot of the infected device.
Last year, Logitech announced that the security certificate of its Harmony Link IoT device, which allowed users to control their home cinema setup using a universal remote control, was to expire on 16 March 2018.
Until governments catch up with IoT security standards and regulation the industry needs to establish a commercial IoT security testing standard and share best practices for IoT risk mitigation.
Another variant of the Mirai botnet was used to attack at least three financial institutions earlier this year using a variety of compromised consumer and enterprise-level IoT products.
Businesses, under constant threat of cyber-attack, have been forced to change the way they view and manage cyber-security to ensure they're not leaving themselves vulnerable.
Government plans for IOT security welcomed but also criticised as being only a set of advisories and recommendations which do not include watertight regulations around credentials and authentication.
If devices are shipped with the low-hanging fruit problems removed, security becomes a consumer requirement, which will lead hardware vendors to guarantee a baseline level of security.
Cyber-attacks against IoT devices have grown markedly over the past two years, prompting a warning from Interpol that nearly any IoT device - from refrigerators to smartphones - is vulnerable to attack.
Mirai and Satori show the potential malicious actors can have when armed with malware and lots of unsecured IoT connected devices to target.
Several Smart TVs from Samsung and others using the Roku TV platform, as well as media players from that company, are susceptible cyber-attacks, according to Consumer Reports, a claim denied vehemently by Roku.
Autosploit, a new tool that basically couples Shodan and Metasploit, makes it easy for even amateurs to hack vulnerable IoT devices.
Nexus Zeta behind botnet that weaponises router exploit to enlist further vulnerable IoT devices. The author of Satori botnet may also be behind two new Mirai variants called Masuta and PureMasuta.
An emerging botnet comprised of compromised IoT devices dubbed "Hide 'N Seek" or HNS is using custom built Peer-to-Peer communication to exploit victims and build its infrastructure.
IoT is part of a fundamental shift forward in enterprise networking - towards a cloud-enabled 'consume' approach - and yet most companies plan to implement IoT in a way that parallels an outdated way of 'DIY' networking.
With more devices able to connect directly to the web, the IOT s continuously expanding. However, cans of worms are waiting to be opened, including data loss, data manipulation and unauthorised access to devices.
As IoT botnet attacks continue to grow in size and effectiveness in 2018, the damage they cause will force the IoT manufacturing industry to add stronger security to their products.
Some IoT devices have no update capability whatsoever so it's important to focus more on software security; developed using best practices, tested for vulnerabilities, and able to ensure the authenticity and integrity of updates.
IoT devices in the dock as DDoS stages a resurgence, but stealth and sophistication also on the rise.
LG patches holes in its IOT device range following cooperation with CheckPoint, including patching vacuum cleaners which could have become digital spies in the home.
Reaper IOT botnet could be worse than Mirai suggest some commentators as it continues to evolve.
In recent conferences Europol has been teaming up with other organisations to ensure a joint law enforcement approach with Interpol to the darkweb and ransomware especially, and with ENISA to meet the challenge of IOT.
We can expect to see a cyber-security incident at a category one level within the next few years. The government specifying what it will buy is an effective way of changing the market - Ian Levy, technical director, NCSC
With the launch of iOS 11 and the Apple Watch, researchers note Apple's iOS 11 update included eight CVEs that patched vulnerabilities in iBooks, Mail MessageUI, Messages, MobileBackup, Safari, and Webkit.
Innovation in the IoT may be rapid, but security trails far behind. Nick Cook looks at why securing the IoT must be a priority, not an afterthought, and how collaborative action is fundamental to ensuring its successful future.
In our connected society, securing the network "hive" is very much a team effort. Only by assessing and defining the landscape in the first instance can a successful security strategy be put in place says Russell Crampin
Humans and machine learning will have to come together to test autonomous vehicles, and the idea of crash test dummy with an AI brain may soon become a very necessary reality.
The issue for home IOT devices is trust and ease of use says Kevin Cunningham, managing director at SQS, and perceived problems of the connected home, such as security issues and privacy issues, need to be addressed now.
A 13 year old hacker caught trying to build up botnet to hack CCTV cameras demonstrates that attacking IoT devices is literally child's play, thanks to widespread sharing of IoTmalware.