Cybercriminals recently discovered how to modify the Mirai botnet source code, which leaked in September, to compromise devices remotely via TCP port 7547.
The Department of Homeland Security (DHS) recently issued a set of nonbinding principles for securing the internet of things (IoT).
The third wave of the internet requires an approach to identity management that recognizes the need to share PII selectively to maximize its value.
The rapid growth of the Indian IoT market is encouraging, but more connected devices mean more vulnerabilities for cybercriminals to exploit.
It's important to consider factors related to operations and infrastructure, not just threats, when discussing grid security for the utilities industry.
Cybercriminals have learned how to exploit the IoT and Telnet servers to commit record-shattering DDoS attacks against major websites.
In the past few months, researchers have observed large-scale DDoS attacks that leverage vulnerable IoT devices to create massive botnets.
Security researcher Ali Abbasi developed a new type of PLC malware that leverages existing problems related to microprocessors and avoids detection.
Domain name provider Dyn suffered the largest DDoS attack in history on Oct. 21. DDoS is nothing new, but the attack highlights some alarming trends.
Companies have a vested interest when it comes to ferreting out IT problems before cybercriminals manage to launch attacks in the wild. The recent Mirai infections are proof positive that compromised Internet of Things (IoT) devices paved the way...