P2PInfect malware variant targets IoT devices

Cybersecurity researchers from Cado Security Labs have uncovered a novel variant of the P2PInfect botnet that poses a heightened risk by targeting IoT devices.

The latest P2PInfect variant – compiled for Microprocessor without Interlocked Pipelined Stages (MIPS) architecture – signifies an expansion of the malware's capabilities, potentially paving the way for widespread infections.

Security researcher Matt Muir highlighted the significance of targeting MIPS,...

Asimily report highlights threats to connected healthcare devices

Asimily has released a report delving into the intricate challenges faced by healthcare delivery organisations (HDOs) when it comes to safeguarding their Internet of Medical Things (IoMT) devices from cyber threats.

HDOs are grappling with a myriad of issues, chiefly the fact that their dependency on connected devices is paramount to patient outcomes and the quality of care. In a field where even minor service interruptions can have life-altering consequences, the stakes are...

Qiang Huang, Palo Alto Networks: On addressing IoT device security challenges

The security of IoT devices is of paramount concern across various industries as the digital landscape continues to evolve.

IoT News caught up with Qiang Huang, head of IoT security product management at Palo Alto Networks, to shed light on the advancements and challenges facing IoT security.

Huang emphasised that, while IoT has become integral for digital transformation journeys across industries, the surge in connected devices has led to heightened security...

IoT will drive the embedded security market to $4.6B

According to ABI Research, the demand for embedded security in IoT devices is on the rise.

In the rapidly-evolving landscape of the IoT, high-performance embedded secure hardware is becoming increasingly important.

Traditionally, high-performance secure hardware has been associated with devices such as PCs and smartphones. However, as penetration into these markets reaches saturation, new opportunities are emerging in the IoT sector.

IoT devices have long...

Anker admits Eufy cams weren’t encrypted

Anker has finally acknowledged that its Eufy smart cameras weren’t end-to-end encrypted.

In November, security researcher Paul Moore highlighted that Eufy cameras were uploading data even when cloud upload settings were disabled. However, an even more concerning finding was that camera streams could be watched live through external video players.

Anker promoted local storage and end-to-end encryption as core features of its security cameras. Several publications have...

Arlo criticised for new end-of-life policy

Netgear spinoff Arlo has been criticised for pulling support for several of its connected security cameras over a relatively short period.

In a new EOL policy, Arlo announced that it may end support for any camera that hasn’t been manufactured for four years old.

Arlo manufactures popular security cameras. Purchasers typically buy a security camera, set it up, and forget about it until it breaks. Every tech product reaches end-of-life (EOL) eventually but you expect...

Swatters used Ring cams to stream victims and taunt police

ring doorbell cyber security cybersecurity iot internet of things infosec

Prosecutors have charged two men with conducting “swatting” attacks that used Ring cameras to livestream the response and taunt police.

Swatters make a false report to law enforcement that prompts an armed response to an address. While often intended to be a sick form of entertainment, they pull resources from where they could actually be needed and — in several cases — have proven to be fatal.

Kya Christian Nelson and James Thomas Andrew McCarty compromised 12...

UK, Canada, and Singapore join forces to secure IoT devices

The UK, Canada, and Singapore are joining forces to improve the security of IoT devices.

In a joint statement, the governments of the respective countries noted the economic and social benefits of IoT devices. However, they also warned of the risks of insecure IoT devices not just to consumers’ own security, privacy, and safety, but also to the broader economy through large-scale cyberattacks.

Many record-breaking cyberattacks have taken advantage of the often poor...

Japanese firms team up to protect connected cars

NTT Communications and DENSO are joining forces to respond “to the threat of increasingly sophisticated cyber-attacks against vehicles.”

The companies are developing the Security Operation Center for Vehicles (VSOC).

Hackers target connected cars for numerous reasons, including location tracking, data gathering, and causing physical harm.

NTT brings to the partnership its vast knowledge and solutions in fields such as networking and cloud computing....

Natali Tshuva, Sternum: On ‘future-proof’ IoT security

Sternum is using patented technology to protect IoT devices against even unknown vulnerabilities in real-time.

The company was co-founded by Natali Tshuva, who was recognised for her talents from an early age and was handpicked at 19 to serve in the Israeli Defense Forces’ 8200 unit (the equivalent of the MI6 in the UK or the NSA in the US.) She then went on to hold numerous high-level cybersecurity roles before founding Sternum.

IoT News caught up with Natali to...