Court Documents Reveal How Feds Spied On Connected Cars For 15 Years

It’s not always necessary to break into your computer or smartphone to spy on you. Today all are day-to-day devices are becoming more connected to networks than ever to add convenience and ease to daily activities.

But here’s what we forget: These con… Continue reading Court Documents Reveal How Feds Spied On Connected Cars For 15 Years

Court Documents Reveal How Feds Spied On Connected Cars For 15 Years

It’s not always necessary to break into your computer or smartphone to spy on you. Today all are day-to-day devices are becoming more connected to networks than ever to add convenience and ease to daily activities.

But here’s what we forget: These con… Continue reading Court Documents Reveal How Feds Spied On Connected Cars For 15 Years

St. Jude Medical Patches Vulnerable Cardiac Devices

St. Jude Medical patched the Merlin@home Transmitter, addressing flaws made public last year in a controversial disclosure by MedSec Holdings and Muddy Waters. Continue reading St. Jude Medical Patches Vulnerable Cardiac Devices

St. Jude Medical Patches Vulnerable Cardiac Devices

St. Jude Medical patched the Merlin@home Transmitter, addressing flaws made public last year in a controversial disclosure by MedSec Holdings and Muddy Waters. Continue reading St. Jude Medical Patches Vulnerable Cardiac Devices

FTC Issues Public Challenge to Improve IoT Patching

The FTC announced the IoT Home Inspector Challenge, a contest with the goal of coming up with a patching solution fit for consumer-grade connected devices used in the home. Continue reading FTC Issues Public Challenge to Improve IoT Patching

IoT Security: Who Is Stepping Up?

Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.

The post IoT Security: Who Is Stepping Up? appeared first on Security Intelligence.

Continue reading IoT Security: Who Is Stepping Up?

IoT Security: Who Is Stepping Up?

Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.

The post IoT Security: Who Is Stepping Up? appeared first on Security Intelligence.

Continue reading IoT Security: Who Is Stepping Up?

2016: The Year of the DDoS Attack

In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.

The post 2016: The Year of the DDoS Attack appeared first on Security Intelligence.

Continue reading 2016: The Year of the DDoS Attack

2016: The Year of the DDoS Attack

In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.

The post 2016: The Year of the DDoS Attack appeared first on Security Intelligence.

Continue reading 2016: The Year of the DDoS Attack

Secure Your IoT Deployment by Paying Attention to These Four Factors

It has never been more important to secure your IoT deployment. Challenges include lack of visibility, inexperience and the IoT’s increasing complexity.

The post Secure Your IoT Deployment by Paying Attention to These Four Factors appeared first on Security Intelligence.

Continue reading Secure Your IoT Deployment by Paying Attention to These Four Factors