Critical Flaw in GoAhead Web Server Could Affect Wide Range of IoT Devices

Cybersecurity researchers today uncovered details of two new vulnerabilities in the GoAhead web server software, a tiny application widely embedded in hundreds of millions of Internet-connected smart devices.

One of the two vulnerabilities, assigned a… Continue reading Critical Flaw in GoAhead Web Server Could Affect Wide Range of IoT Devices

When Stalkerware Stalks the Enterprise

Stalkerware is a real problem that can lead to individuals being tracked and stalked via software on their smartphones. It’s also a growing and underappreciated threat to enterprises.

The post When Stalkerware Stalks the Enterprise appeared first on Security Intelligence.

Continue reading When Stalkerware Stalks the Enterprise

The Potential and Perils of the IoT in Healthcare

The IoT in healthcare is ever-expanding. This growth is bringing new capabilities and opportunities for innovation but also new challenges and security risks.

The post The Potential and Perils of the IoT in Healthcare appeared first on Security Intelligence.

Continue reading The Potential and Perils of the IoT in Healthcare

How to Avoid an IoT Doomsday

IoT is everywhere. From the moment Alexa wakes us up to our morning commutes, consumers are more adjusted to the IoT sector than they may know. In fact, according to data from IoT Analytics, there are about 7 billion internet-connected devices and tha… Continue reading How to Avoid an IoT Doomsday

Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security

Many manufacturers of connected devices fail to recognize the IoT security implications of customers tinkering with their products.

The post Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security appeared first on Security Intelligence.

Continue reading Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security

3 Key Questions to Help Address Enterprise IoT Security Risks

Enterprises are adopting IoT devices to improve efficiency and deliver truly memorable and competitive experiences. With this influx of connected devices comes a host of new IoT security risks.

The post 3 Key Questions to Help Address Enterprise IoT Security Risks appeared first on Security Intelligence.

Continue reading 3 Key Questions to Help Address Enterprise IoT Security Risks

Arm brings custom instructions to its embedded CPUs

At its annual TechCon event in San Jose, Arm today announced Custom Instructions, a new feature of its Armv8-M architecture for embedded CPUs that, as the name implies, enables its customers to write their own custom instructions to accelerate their specific use cases for embedded and IoT applications. “We already have ways to add acceleration, […] Continue reading Arm brings custom instructions to its embedded CPUs

How Will 5G Deployment Impact Smart Cities?

There’s no doubt that 5G deployment is going to be a game changer for smart cities. But anything that is going to generate data in ways we’ve not seen before is going to create cybersecurity concerns.

The post How Will 5G Deployment Impact Smart Cities? appeared first on Security Intelligence.

Continue reading How Will 5G Deployment Impact Smart Cities?

The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019

This year, National Cyber Security Awareness Month focuses on a trifecta of themes: Own IT, Secure IT and Protect IT.

The post The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019 appeared first on Security Intelligence.

Continue reading The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019