Verizon: IoT/mobile cyberattacks leading to downtime increase 22%

Verizon’s latest Mobile Security Index (MSI) highlights continuing growth in IoT/mobile cyberattacks leading to downtime.

According to the research, cyberattacks in the last year involving a mobile/IoT device – that resulted in data or system downtime – increased 22 percent year-on-year.

23 percent of surveyed enterprises had suffered a compromise. Of those, 74 percent said the impact was “major” and over a third (34%) said that it had lasting...

Sternum debuts IoT attack simulation platform

IoT cybersecurity specialists Sternum have released the first real-world attack simulation and evaluation platform.

Last year, a report by Fortune Business Insights found that 67 percent of enterprises have experienced an IoT security incident.

Furthermore, 84 percent of security professionals believe IoT devices are more vulnerable than computers—a concerning statistic given that 69 percent of enterprises have more IoT devices on their networks than...

What cloud-based IoT software means for the future of security

Security Camera

72% of information security leaders state that cloud computing represents a top priority in digital transformation. Cloud-based IoT software is changing the nature of both digital and physical security, allowing both security elements to be merged and used to leverage data better.

So, what does cloud-based IoT software mean for the future of security? Keep reading to learn about the ways cloud-based software is helping to improve efficiency and convenience in the security sphere....

Mirai variant ‘Beastmode’ exploits fresh vulnerabilities

A variant of the Mirai botnet called Beastmode has been observed exploiting recently-discovered vulnerabilities.

The Mirai botnet is composed primarily of IoT and embedded devices. In 2016, Mirai made national headlines when it used exploited connected devices to overwhelm several high-profile targets with record-setting Distributed Denial-of-Service (DDoS) attacks.

Mirai’s original creator was arrested in the fall of 2018 but variants have continued to emerge which...

Editorial: 10 predictions for the IoT in 2022

As we begin wrapping up the year, it’s time to predict what the IoT industry will look like in 2022.

Seamlessly connected homes

“The US market has seen substantial year-over-year growth in the number of connected homes, and this is expected to continue in the years to come,” analysts from McKinsey said in a recent report.

“However, we're still far from the vision of seamlessly connected homes.”

The emergence of Thread as a widely-backed...

UK introduces PSTI bill to protect IoT devices

The UK has introduced the Product Security and Telecommunications Infrastructure (PSTI) bill which promises to protect IoT devices.

Many “smart” devices fail to live up to their name when it comes to security. As manufacturers seek to keep pace with the demand for IoT devices, security is too often an afterthought.

Julia Lopez, Minister for Media, Data, and Digital Infrastructure, said:

“Every day hackers attempt to break into people’s smart devices....

Trend Micro and Fujitsu set out to secure connected vehicles

Cybersecurity giant Trend Micro has partnered with Fujitsu on a solution to secure connected vehicles.

The pair are collaborating with “automotive-related” manufacturers to ensure the solution meets their needs.

A V-SOC (Vehicle-Security Operation Center) is the core service at the centre of the solution—featuring an abnormality attack detection engine, vital data collection for incident response, and monitoring analysis notifications.

On the backend,...

Why your phone is the key to better building security

The prevalence of smartphones and apps like Apple Wallet, which stores digital versions of credit cards, boarding passes, and event tickets, make our phones an essential part of everyday life. Now that Apple has opened the Wallet app to developers, experts expect to see an increase in mobile credentials used for everything from unlocking cars to storing driver’s licenses, to accessing the office. In this article, we’ll take a closer look at how mobile credentials impact cyber and...

Paul Zimski, VP of Product, Automox: On keeping up with endpoint security

Keeping pace with increasing cybersecurity threats is more important than ever. The rapid proliferation of IoT devices and their historically poor security practices have made them key targets while changing working practices unlocks new opportunities but also threats.

In this interview with Paul Zimski, VP of Product at Automox, IoT News tapped the company’s expertise in endpoint security to gain insights into how to keep up with such evolving threats.

IoT News:...

Kaspersky: Attacks on IoT devices double in a year

Research from the cybersecurity gurus at Kaspersky has found that attacks targeting IoT devices have doubled over the past year.

The rapid proliferation of IoT devices, combined with often poor security, makes them an increasingly attractive target for hackers. Analysts at McKinsey estimate that 127 new devices are connected every second.

Dan Demeter, Security Expert at Kaspersky, said:

“Since IoT devices, from smartwatches to smart home accessories, have...