Eufy "no cloud" security cameras streaming data to the cloud

Eufy home security cameras are currently in a spot of trouble as a result of door camera footage. This is because it turns out that data that should not have been going to the cloud was doing so anyway in certain conditions.

Network and IoT security in a zero trust security model

Different approaches provide different levels of security, but one thing they have in common is that they need to instill the appropriate level of trust that they will keep the private key private.

Singapore inks pact with Finland to mutually recognise IoT security labels

Singapore and Finland have inked an agreement to mutually recognize each country's cybersecurity labels for IoT devices, aimed at helping consumers assess the level of security in such products.

FIDO launches protocol to secure IoT onboarding to cloud and on-premise management platforms

The FIDO Alliance announced the launch of FIDO Device Onboard protocol, a new, open IoT standard that will enable devices to simply and securely onboard to cloud and on-premise management platforms.

Amazon Dismisses Claims Alexa 'Skills' Can Bypass Security Vetting Process

Researchers warn Amazon’s voice assistant Alexa is vulnerable to malicious third-party “skills” that could leave smart-speaker owners vulnerable to a wide range of cyberattacks. The security-threat claim is roundly dismissed by Amazon.

Elektra Labs and CMU collaborate on privacy and security labels of connected health sensors

Elektra Labs and CMU researchers announced a collaboration on an innovative IoT labeling system for understanding the data rights and security practices of connected health sensors.

Smart Doorbell Disaster: Many Brands Vulnerable to Attack

Smart doorbells, designed to allow homeowners to keep an eye on unwanted and wanted visitors, can often cause more security harm than good compared to their analog door bolt alternatives.

IoT Security Foundation unveils online platform to help IoT vendors report and manage vulerabilities

VulnerableThings.com, an online platform designed to help IoT vendors receive, assess, manage, and mitigate vulnerability reports has been launched by the IoT Security Foundation (IoTSF).
September 29, 2020

White hat hacker infects smart coffee machine with ransowmare

Martin Hron, a senior researcher at security firm Avast, hacked the iKettle coffee maker’s third version, which costs $230, and installed ransomware, without compromising the network or router.
September 17, 2020

Coffee machines, cuddly toys, and cars: The Internet of Things devices that could put you at risk from hackers

More and more devices are being connected to corporate networks - and in many cases, organizations don't even know they're there. But cybercriminals do.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags