53% of medical devices have a known critical vulnerability

After a year of unprecedented ransomware attacks on hospitals and healthcare systems – and with healthcare now the #1 target for cybercriminals – critical medical device risks in hospital environments continue to leave hospitals and their patients vuln… Continue reading 53% of medical devices have a known critical vulnerability

IoT data management market to grow steadily by 2026

35% of the growth will originate from North America for the IoT data management market. The US is the key market for IoT data management in North America. Market growth in North America will be faster than the growth of the market in other regions. The… Continue reading IoT data management market to grow steadily by 2026

Trends that will shape the security industry in 2022

Entering 2022, the world continues to endure the pandemic. But the security industry has, no doubt, continued to shift, adapt, and develop in spite of things. Several trends have even accelerated. Beyond traditional “physical security,” a h… Continue reading Trends that will shape the security industry in 2022

Using EM Waves to Detect Malware

I don’t even know what I think about this. Researchers have developed a malware detection system that uses EM waves: “Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification.”

Abstract: The Internet of Things (IoT) is constituted of devices that are exponentially growing in number and in complexity. They use numerous customized firmware and hardware, without taking into consideration security issues, which make them a target for cybercriminals, especially malware authors.

We will present a novel approach of using side channel information to identify the kinds of threats that are targeting the device. Using our approach, a malware analyst is able to obtain precise knowledge about malware type and identity, even in the presence of obfuscation techniques which may prevent static or symbolic binary analysis. We recorded 100,000 measurement traces from an IoT device infected by various in-the-wild malware samples and realistic benign activity. Our method does not require any modification on the target device. Thus, it can be deployed independently from the resources available without any overhead. Moreover, our approach has the advantage that it can hardly be detected and evaded by the malware authors. In our experiments, we were able to predict three generic malware types (and one benign class) with an accuracy of 99.82%. Even more, our results show that we are able to classify altered malware samples with unseen obfuscation techniques during the training phase, and to determine what kind of obfuscations were applied to the binary, which makes our approach particularly useful for malware analysts…

Continue reading Using EM Waves to Detect Malware

Detect and identify IoT malware by analyzing electromagnetic signals

Electromagnetic (EM) emanations can be recorded and used to detect and identify malware running on IoT devices, a group of researchers working at IRISA have proven. The setup for collecting EM emanations This novel malware detection approach also offer… Continue reading Detect and identify IoT malware by analyzing electromagnetic signals

LTE IoT market to grow steadily by 2026

LTE IoT market is expected to register a healthy CAGR of over 28% during the forecast period (2021 – 2026), accordig to ResearchAndMarkets. The growth of connected devices and the need for unique and defined network qualities are fueling the grow… Continue reading LTE IoT market to grow steadily by 2026

Manufacturers of IT devices should step up when it comes to security

With significant growth projected in the global IoT market over the next 6 years, the need to subsequently secure devices at the edge from attacks, safe and secure through the manufacturing process, and managed securely throughout the life of the produ… Continue reading Manufacturers of IT devices should step up when it comes to security

Kaspersky Security Bulletin 2021. Statistics

Key statistics for 2021: miners, ransomware, trojan bankers and other financial malware, zero-day vulnerabilities and exploits, web attacks, threats for macOS and IoT. Continue reading Kaspersky Security Bulletin 2021. Statistics

Kaspersky Security Bulletin 2021. Statistics

Key statistics for 2021: miners, ransomware, trojan bankers and other financial malware, zero-day vulnerabilities and exploits, web attacks, threats for macOS and IoT. Continue reading Kaspersky Security Bulletin 2021. Statistics

The cyber risk future doesn’t look good, but organizations are ready

A Trend Micro report predicts global organizations will emerge more alert and better prepared in 2022 thanks to a comprehensive, proactive, cloud-first approach to mitigating cyber risk. Research, foresight, and automation are critical for organization… Continue reading The cyber risk future doesn’t look good, but organizations are ready