Data Protection September 2, 2016 Data Sabotage: The Serious Security Risk of Smart Cities 4 min read - Smart city technology is on the rise, bringing more efficient ways to administer city services. But the new threat of data sabotage also looms.
September 1, 2016 BASHLITE Malware Uses IoT for DDoS Attacks 2 min read - The BASHLITE malware family targets IoT devices to create botnets capable of conducting DDoS attacks. One million endpoint devices were affected.
Application Security September 1, 2016 Is IoT Security a Ticking Time Bomb? 3 min read - The IoT will continue to grow at a rapid pace, but many devices, apps and infrastructure are developed with IoT security as an afterthought.
Endpoint August 15, 2016 Are Fitness Bands Secure? There’s More to It Than Just the Clasp! 2 min read - Cybercriminals can easily compromise fitness bands that use Bluetooth 4.0 VLE due to limitations in the key exchange of its encryption protocol.
Advanced Threats August 11, 2016 Impressions From DEF CON 24: The Machines Are Rising 5 min read - The machines rose at DEF CON 24 in Las Vegas. Autonomous hacking machines successfully analyzed, patched and exploited software at the conference.
August 2, 2016 Flaws Found: Social Side of Black Hat App Goes Dark 2 min read - The official 2016 Black Hat app contained a number of serious social flaws, which organizers disabled before the app went live.
X-Force July 27, 2016 Exploring Operating Systems for the Internet of Things 2 min read - As the Internet of Things becomes more prevalent, the demand for the technologies needed to manage and secure devices becomes greater.
Advanced Threats July 20, 2016 The Threat From Weaponized IoT Devices: It’s Bigger Than You Think! 3 min read - Cybercriminals are leveraging IoT devices to carry out extremely sophisticated attacks. How do you protect yourself and your organization?
X-Force July 13, 2016 Hacking the Connected Building: Real-Life ‘Mr. Robot’ 2 min read - The second season of "Mr. Robot" could focus on IoT and hacking a connected building, just like the IBM X-Force team was able to do in real life.
Advanced Threats July 8, 2016 3-D Printing Vulnerabilities: Build Your Own Breach? 3 min read - A surge in 3-D printing vulnerabilities could leave the enterprise open to intellectual property theft or general process disruption.