Industrial IoT technologies promise to revolutionize the automotive industry, but they also introduce new risks. What are the biggest threats auto companies face, and how can they mitigate them?
Malware authors have released modified versions of the Mirai and Gafgyt IoT malware that are capable of targeting vulnerabilities affecting SonicWall's GMS and Apache Struts.
While the use of AI in healthcare promises to improve visibility and implementation, there are serious risks associated with the emerging technology if misused by staff or abused by threat actors.
The smart office market is forecast to double by 2023. But while IoT devices promise to bring a bevy of benefits, they also introduce entirely new categories of cyber risk.
At Black Hat 2018 and DEF CON 26, experts shared insights about IoT security risks and vulnerabilities and offered advice to help organizations and consumers navigate our increasingly connected world.
Topics of discussion at this year's Black Hat conference included the Internet of Things (IoT) in smart cities, the latest advancements in vulnerability management and more.
Researchers from Threatcare and IBM X-Force Red joined forces to test several smart city devices, with the goal of investigating "supervillain-level" attacks. Here's what the teams found.
An unknown threat actor leaked the source code for the Android malware Exobot, leading to fears of an impending attack similar to the massive DDoS incident that hit domain name provider Dyn in 2016.
Security researchers identified two new threats in the wild that are designed to compromise consumer devices to build IoT botnets.
While securing the variety of known devices on your network is hard work, it may feel impossible to manage uninvited guests. Here's how to effectively manage rogue devices.