IoT
News & Commentary
12 Trends Shaping Identity Management
Sara Peters, Senior Editor at Dark Reading
As IAM companies try to stretch 'identity context' into all points of the cybersecurity market, identity is becoming 'its own solar system.'
By Sara Peters Senior Editor at Dark Reading, 4/26/2018
Comment0 comments  |  Read  |  Post a Comment
Deconstructing the Possibilities and Realities of Enterprise IoT Security
Bill Kleyman, Chief Technology Officer, MTM TechnologiesCommentary
Organizations are rushing to leverage Internet of Things solutions but struggle to design the information technology architectures that will lock down the data these devices create.
By Bill Kleyman Chief Technology Officer, MTM Technologies, 4/24/2018
Comment2 comments  |  Read  |  Post a Comment
First Public Demo of Data Breach via IoT Hack Comes to RSAC
Sara Peters, Senior Editor at Dark ReadingNews
At RSA Conference, senior researchers will show how relatively unskilled attackers can steal personally identifiable information without coming into contact with endpoint security tools.
By Sara Peters Senior Editor at Dark Reading, 4/19/2018
Comment0 comments  |  Read  |  Post a Comment
DHS Helps Shop Android IPS Prototype
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
A MITRE-developed intrusion prevention system for mobile technology is showcased here this week at the RSA Conference.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/18/2018
Comment0 comments  |  Read  |  Post a Comment
Microsoft to Roll Out Azure Sphere for IoT Security
Kelly Sheridan, Staff Editor, Dark ReadingNews
Azure Sphere, now in preview, is a three-part program designed to secure the future of connected devices and powered by its own custom version of Linux.
By Kelly Sheridan Staff Editor, Dark Reading, 4/16/2018
Comment0 comments  |  Read  |  Post a Comment
INsecurity Conference Seeks Security Pros to Speak on Best Practices
Tim Wilson, Editor in Chief, Dark Reading, News
Dark Reading's second annual data defense conference will be held Oct. 23-25 in Chicago; call for speakers is issued.
By Tim Wilson, Editor in Chief, Dark Reading , 4/16/2018
Comment1 Comment  |  Read  |  Post a Comment
'SirenJack' Vulnerability Lets Hackers Hijack Emergency Warning System
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Unencrypted radio protocol that controls sirens left alert system at risk.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/10/2018
Comment0 comments  |  Read  |  Post a Comment
6 Myths About IoT Security
Steve Zurier, Freelance Writer
Here are common misconceptions about securing these devices - and tips for locking them down.
By Steve Zurier Freelance Writer, 4/9/2018
Comment0 comments  |  Read  |  Post a Comment
Businesses Fear 'Catastrophic Consequences' of Unsecured IoT
Kelly Sheridan, Staff Editor, Dark ReadingNews
Only 29% of respondents in a new IoT security survey say they actively monitor the risk of connected devices used by third parties.
By Kelly Sheridan Staff Editor, Dark Reading, 4/6/2018
Comment0 comments  |  Read  |  Post a Comment
Mirai Variant Botnet Takes Aim at Financials
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
In January, a botnet based on Mirai was used to attack at least three European financial institutions.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/5/2018
Comment1 Comment  |  Read  |  Post a Comment
Medical Device Security Startup Launches
Dark Reading Staff, Quick Hits
Cynerio lands multi-million dollar funding round.
By Dark Reading Staff , 4/3/2018
Comment0 comments  |  Read  |  Post a Comment
Getting Ahead of Internet of Things Security in the Enterprise
Simon Eappariello, Senior VP Product & Engineering, EMEIA, iboss
In anticipation of an IoT-centric future, CISOs must be rigorous in shoring up defenses that provide real-time insights across all network access points.
By Simon Eappariello Senior VP Product & Engineering, EMEIA, iboss, 3/28/2018
Comment0 comments  |  Read  |  Post a Comment
Looking Back to Look Ahead: Cyber Threat Trends to Watch
Derek Manky, Global Security Strategist, FortinetCommentary
Data from the fourth quarter of last year shows the state of application exploits, malicious software, and botnets.
By Derek Manky Global Security Strategist, Fortinet, 3/23/2018
Comment1 Comment  |  Read  |  Post a Comment
7 Ways to Protect Against Cryptomining Attacks
Jai Vijayan, Freelance writer
Implementing basic security hygiene can go a long way in ensuring your systems and website don't get hijacked.
By Jai Vijayan Freelance writer, 3/22/2018
Comment0 comments  |  Read  |  Post a Comment
Gartner Expects 2018 IoT Security Spending to Reach $1.5 Billion
Jai Vijayan, Freelance writerNews
Regulations, breach concerns will push spending to over $3 billion by 2021, analyst firm says.
By Jai Vijayan Freelance writer, 3/21/2018
Comment0 comments  |  Read  |  Post a Comment
Google 'Distrust Dates' Are Coming Fast
Zeus Kerravala, Founder and Principal Analyst, ZK ResearchCommentary
All the tools are in place for the migration of SSL digital certificates on a scale that is unprecedented for the certificate authority industry. Are you ready?
By Zeus Kerravala Founder and Principal Analyst, ZK Research, 3/13/2018
Comment0 comments  |  Read  |  Post a Comment
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Pat Osborne, Principal - Executive Consultant at Outhaul Consulting, LLC, & Cybersecurity Advisor for the Security Innovation CenterCommentary
Proposed new connected-product repair laws will provide hackers with more tools to make our lives less secure.
By Pat Osborne Principal - Executive Consultant at Outhaul Consulting, LLC, & Cybersecurity Advisor for the Security Innovation Center, 3/12/2018
Comment2 comments  |  Read  |  Post a Comment
What Happens When You Hold Robots for Ransom?
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers explore why an attacker would target robots with ransomware, and the implications of what might happen if they did.
By Kelly Sheridan Staff Editor, Dark Reading, 3/10/2018
Comment1 Comment  |  Read  |  Post a Comment
Connected Cars Pose New Security Challenges
James Plouffe, Lead Architect at MobileIronCommentary
The auto industry should seize the opportunity and get in front of this issue.
By James Plouffe Lead Architect at MobileIron, 3/6/2018
Comment3 comments  |  Read  |  Post a Comment
Securing the Web of Wearables, Smartphones & Cloud
Kelly Sheridan, Staff Editor, Dark ReadingNews
Why security for the Internet of Things demands that businesses revamp their software development lifecycle.
By Kelly Sheridan Staff Editor, Dark Reading, 3/1/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Diversity: It's About Inclusion
Kelly Jackson Higgins, Executive Editor at Dark Reading,  4/25/2018
Threat Intel: Finding Balance in an Overcrowded Market
Kelly Sheridan, Staff Editor, Dark Reading,  4/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.