Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.
In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.
It has never been more important to secure your IoT deployment. Challenges include lack of visibility, inexperience and the IoT's increasing complexity.
Bluetooth security is not strong enough to keep fraudsters from eavesdropping on sensitive communications. The upcoming Bluetooth 5 offers enhancements.
The Proteus malware enables fraudsters to commandeer devices to act as proxy servers or keyloggers, validate credentials or mine for cryptocurrencies.
Cybercriminals recently discovered how to modify the Mirai botnet source code, which leaked in September, to compromise devices remotely via TCP port 7547.
The Department of Homeland Security (DHS) recently issued a set of nonbinding principles for securing the internet of things (IoT).
The rapid growth of the Indian IoT market is encouraging, but more connected devices mean more vulnerabilities for cybercriminals to exploit.
Domain name provider Dyn suffered the largest DDoS attack in history on Oct. 21. DDoS is nothing new, but the attack highlights some alarming trends.
Though DDoS attacks using authentic IoT devices are easy to detect, they are one of the more difficult attack types to remediate.