IT threat evolution in Q2 2022. Non-mobile statistics

Our non-mobile malware statistics for Q2 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. Continue reading IT threat evolution in Q2 2022. Non-mobile statistics

Introducing the book: If It’s Smart, It’s Vulnerable

All our devices and gadgets are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters… Continue reading Introducing the book: If It’s Smart, It’s Vulnerable

Cyberattacks on healthcare organizations negatively impact patient care

Cynerio and the Ponemon Institute have examined the current impact of cyberattacks on healthcare facilities and network-connected IoT and medical devices, and found multiple alarming trends. Among other things, the survey has also revealed that almost … Continue reading Cyberattacks on healthcare organizations negatively impact patient care

Data privacy regulation a top three challenge for IoT adopters

Fears over security have become less of a concern for organizations adopting IoT solutions than it was five years ago, according to a recent study by Wi-SUN Alliance, a global member-based association of industry leading companies driving the adoption … Continue reading Data privacy regulation a top three challenge for IoT adopters

DDoS attacks in Q2 2022

Politically-motivated cyberattacks dominated the DDoS landscape in the second quarter of 2022 just as they did in Q1. Also, we saw the continuation of a trend that began in spring: an increase in superlong attacks. Continue reading DDoS attacks in Q2 2022

How to choose IIoT software: Must-have features for any business

Learn which IIoT platform features are essential and access TechRepublic Premium resources that will simplify your search for the ideal software.
The post How to choose IIoT software: Must-have features for any business appeared first on TechRepublic.
Continue reading How to choose IIoT software: Must-have features for any business

How kitemarks are kicking off IoT regulation

Regulation of the Internet of Things (IoT) has always been a contentious subject. Those against claim it stymies growth of a nascent industry, while those advocating for it argue it sees the adoption of industry best practices and helps establish stand… Continue reading How kitemarks are kicking off IoT regulation

Vulnerabilities in popular GPS tracker could allow hackers to remotely stop cars

Six vulnerabilities in the MiCODUS MV720 GPS tracker that’s used by organizations around the world to manage and protect vehicle fleets could be exploited by attackers to remotely cut fuel to or abruptly stop vehicles. “Attackers could choo… Continue reading Vulnerabilities in popular GPS tracker could allow hackers to remotely stop cars

Attackers can surveil, disrupt vehicles outfitted with popular GPS tracker, CISA warns

Experts say the vulnerabilities found in the MiCODUS GPS tracker reflect a larger security problem in the Internet of Things ecosystem.

The post Attackers can surveil, disrupt vehicles outfitted with popular GPS tracker, CISA warns appeared first on CyberScoop.

Continue reading Attackers can surveil, disrupt vehicles outfitted with popular GPS tracker, CISA warns