Doctors at RSA on Thursday presented a riveting simulation of a health care emergency caused by a medical device hack -- showing that physicians' trust in the integrity of their equipment can be misplaced.
Researchers from IOActive have developed a proof-of-concept attack that turns ordinarily benevolent robots into malicious, money-grubbing automatons who demand bitcoin as a ransom payment.
Interpol recently drew 43 investigators and digital forensics pros from 23 countries together for its Digital Security Challenge - one in which a cyberattack is launched from a hacked IoT device, a webcam.
A newly discovered variant of Mirai botnet malware forces infected devices to act as proxy servers capable of protecting the anonymity of cybercriminals engaging in illegal activities.
Several Smart TVs from Samsung and others using the Roku TV platform, as well as media players from that company, are susceptible cyberattacks, according to Consumer Reports, a claim denied vehemently by Roku.
A recent worldwide consumer survey found a major disconnect between general fears about cybersecurity and the actions taken to protect not only their personal information, but their families from cyberattacks.
A slew of online services used to manage GPS- and GSM-based location tracking devices have been found vulnerable to flaws that could allow attackers to hijack these devices and reveal their owners' past and current locations.
The code that exploits a flaw in Huawei a router that enables these devices to be turned into botnets to push Satori and Brickerbot has been publicly posted on Pastebin.
Music lovers connected to wireless, Internet-connected Sonos speakers beware that their audio systems could have been unwittingly usurped for nefarious purposes, according to a new report from Trend Micro.
The individual, or people, behind the BrickerBot malware attacks have decided to hang up their mouse and keyboard after claiming to have locked more than 10 million supposedly unsecure Internet of Things devices.
A new strain of the Mirai IoT malware has been discovered following the publication of exploit code targeting networking equipment.
A new bill designed to identify, verify, and label compliant Internet-of-Things (IoT) devices with strong cybersecurity standards has been introduced by two federal lawmakers.
LG Electronics has patched a bug in its smart appliance app that can be exploited to gain remote access to devices under its control, including a camera-equipped vacuum that can be abused to spy on its owners.
Malwarebytes researchers are warning users not to buy into the hype, or the actual products, offered with Amazon's Key service.
The Norwegian Consumer Council and Mnemonic researchers are warning consumers about the dangers of poorly secured smartwatches marketed to children.
Google reported it has discovered and issued patches fo seven vulnerabilities in the DNS software package Dnsmasq, several of which could lead to remote code execution or leave the device open to a denial of service attack if exploited.
Despite keeping us connected and even providing a bump in security over its predecessor, 4G networks are still plagued with weaknesses.
An IoT botnet has set its hooks in about 4,500 - 5,000 proxy devices to send spam emails which each device capable of sending 400 messages or a total of 1.8 million messages per day.
A catastrophic worldwide cyberattack and the emergence of an IoT-enabled surveillance state were among the chief security and privacy fears expressed by experts polled for a new report about the internet and its future impact.
Until a new version of Smiths Medical's Medfusion 4000 Wireless Syringe Infusion Pump is issued in January 2018, its operators should be wary of eight vulnerabilities that can be remotely exploited to gain access to the device and compromise its functionality.
Bluetooth ache: Protocol's security not sufficiently researched, experts claim after 'BlueBorne' disclosure
The recently disclosed collection of "BlueBorne" vulnerabilities that were found to affect at least 5.3 billion Bluetooth-enabled devices has revealed several inconvenient truths about the short-range communications protocol, experts say.
Healthcare product manufacturer Abbott Laboratories is updating the firmware and software in its line of implantable pacemakers to shore up a security vulnerability that could lead to unauthorized access.
SMEs may not have the resources of their larger peers but they're training them on identifying threats and determining the potential dangers connected devices pose, according to a study from Pwnie Express.
Cybercriminals have updated the functionality of the popular Svpeng mobile banking trojan giving it keylogger capabilities and the ability to access the text input from almost all of a devices apps.