Precision Agriculture Industry at Risk of Imminent Cybersecurity Threats

A new report from the U.S. Department of Homeland Security called Threats to Precision Agriculture warns against the cybersecurity risks faced by the emerging technologies being adopted by the agricultural industry. Known as “precision agricultur… Continue reading Precision Agriculture Industry at Risk of Imminent Cybersecurity Threats

Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home

As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it’s crucial to establish network security policies for your home IT just as you would at work.

The post Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home appeared first on Security Intelligence.

Continue reading Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home

4 New Smart Office Security Risks and How to Mitigate Them

The smart office market is forecast to double by 2023. But while IoT devices promise to bring a bevy of benefits, they also introduce entirely new categories of cyber risk.

The post 4 New Smart Office Security Risks and How to Mitigate Them appeared first on Security Intelligence.

Continue reading 4 New Smart Office Security Risks and How to Mitigate Them

Smart Lights, Dark Purposes: Connected Lights Can Exfiltrate Your Data

Nowadays, there’s hardly anything that cannot be hacked. Our lives are more vulnerable than they have ever been, and this is mostly due to the smart devices we are using. We won’t be going further into detail about the paradox…Read more
T… Continue reading Smart Lights, Dark Purposes: Connected Lights Can Exfiltrate Your Data

Belkin IoT Smart Plug Flaw Allows Remote Code Execution in Smart Homes

An unpatched buffer overflow flaw allows remote attackers to completely take over the device and enter the home network. Continue reading Belkin IoT Smart Plug Flaw Allows Remote Code Execution in Smart Homes

Stories From the Edge of IoT Security: Threat Demos From Black Hat and DEF CON

At Black Hat 2018 and DEF CON 26, experts shared insights about IoT security risks and vulnerabilities and offered advice to help organizations and consumers navigate our increasingly connected world.

The post Stories From the Edge of IoT Security: Threat Demos From Black Hat and DEF CON appeared first on Security Intelligence.

Continue reading Stories From the Edge of IoT Security: Threat Demos From Black Hat and DEF CON

How to Outsmart the Smart City

Researchers from Threatcare and IBM X-Force Red joined forces to test several smart city devices, with the goal of investigating “supervillain-level” attacks. Here’s what the teams found.

The post How to Outsmart the Smart City appeared first on Security Intelligence.

Continue reading How to Outsmart the Smart City

How Can We Make Smart Cities Even Smarter? Start With Security Intelligence

Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.

The post How Can We Make Smart Cities Even Smarter? Start With Security Intelligence appeared first on Security Intelligence.

Continue reading How Can We Make Smart Cities Even Smarter? Start With Security Intelligence

The Cybercrime Landscape Is Evolving — Will Your Mobile Threat Defense Strategy Keep Up?

As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.

The post The Cybercrime Landscape Is Evolving — Will Your Mobile Threat Defense Strategy Keep Up? appeared first on Security Intelligence.

Continue reading The Cybercrime Landscape Is Evolving — Will Your Mobile Threat Defense Strategy Keep Up?