IoT Devices: Privacy and Security in Abusive Relationships

A few weeks, ago, technology news site The Verge reported on a new Ring security camera that is in fact a drone that flies around inside your house. Available beginning next year, the ‘Always Home Cam’ is supposed to give its owners a total view of the… Continue reading IoT Devices: Privacy and Security in Abusive Relationships

BleedingTooth: Intel Discloses Early, Angering Linux Lovers

A Google researcher discovered a high-severity vulnerability in the Linux Bluetooth stack.
The post BleedingTooth: Intel Discloses Early, Angering Linux Lovers appeared first on Security Boulevard.
Continue reading BleedingTooth: Intel Discloses Early, Angering Linux Lovers

The Good and Not So Good of the IoT Cybersecurity Improvement Act of 2020

In September, the House of Representatives passed a bill requiring that all internet of things (IoT) devices purchased by the government meet minimum security requirements. Of course, with everything being connected to everything, there needs to be a … Continue reading The Good and Not So Good of the IoT Cybersecurity Improvement Act of 2020

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them.
The post Overcoming the Challenges of Detecting P2P Botnets on Your Network appeared first on Nozomi Net… Continue reading Overcoming the Challenges of Detecting P2P Botnets on Your Network

Protecting Connected Cars from Cyberattack

The smart features built into new cars open the door to serious cyber threats. Linked to the internet, connected cars offer cybercriminals the potential ability to remotely access and manipulate the data these systems rely on, which can lead to proble… Continue reading Protecting Connected Cars from Cyberattack

DH2i Extends Software-Defined Perimeter to IoT Devices

DH2i has launched DxOdyssey for IoT, an instance of its software-defined perimeter (SDP) and smart availability software encapsulated in a lightweight container to enable it to run on internet of things (IoT) devices. Company CEO Don Boxley said DxOdy… Continue reading DH2i Extends Software-Defined Perimeter to IoT Devices

Detecting Deep Fakes with a Heartbeat

Researchers can detect deep fakes because they don’t convincingly mimic human blood circulation in the face:

In particular, video of a person’s face contains subtle shifts in color that result from pulses in blood circulation. You might imagine that t… Continue reading Detecting Deep Fakes with a Heartbeat

IoT Security: Don’t Sacrifice Data for Usability

Over the last decade, we’ve seen truly innovative developments bring us to today’s internet of things (IoT). With the advent of inexpensive sensor components and systems on a chip (SoCs), as well as the new programming techniques and tools that share,… Continue reading IoT Security: Don’t Sacrifice Data for Usability