SMEs may not have the resources of their larger peers but they're training them on identifying threats and determining the potential dangers connected devices pose, according to a study from Pwnie Express.
Cybercriminals have updated the functionality of the popular Svpeng mobile banking trojan giving it keylogger capabilities and the ability to access the text input from almost all of a devices apps.
Under the act device makers couldn't hardcore passwords, which have been exploited in the past to spread malware like in the recent Mirai attacks, into products sold to the government.
Two decades from now, warring adversaries could conceivably attack each other by sabotaging a population's IoT consumer devices en masse, respected cybersecurity expert Mikko Hypponen predicted at Black Hat on Thursday.
An unknown actor recently succeeded in hacking into a casino's smart fish tank and exfiltrating its data to a device in Finland.
Cisco researchers are predicting more and larger cyberattacks that have the goal of destroying their targets systems, instead of financial gain or stealing information.
Researchers investigating a vulnerability in security cameras from Axis Communications ended up uncovering a far more wide-ranging threat when they discovered the flaw actually lies within a toolkit used by myriad IoT product developers.
The "Promoting Good Cyber Hygiene Act" would create a baseline of best practices, ensure those practices come under annual review and update and are published on a publicly accessible website.
Linux malware is becoming a more important tool for cybercriminals as these individuals focus a greater portion of their attention on attacking IoT devices running the open-source operating system.
The average bug bounty payout has jumped from $295 a little over a year ago to $451, as the automotive industry leads the way with an average payout of $1,514, according to Bugcrowd, a leading vulnerability disclosure platform provider.
National Grid spokesperson tells SC "gas and electricity networks are isolated from our everyday business systems to ensure our networks remain safe and reliable."
An analysis of roughly 4,400 IP cameras in the U.S. using custom http servers found that just over 51 percent of them are infected by one of four Internet of Things botnet malware families, according to new research.
Apparently emanating from Iran, Persirai has been detected by researchers at Trend Micro linking more than 1,000 internet protocol (IP) camera models into a vast Internet of Things (IoT) botnet.
The sky may have fallen causing agents and servers across the globe to go rogue as the Bondnet 007.01 botnet army seizes victims to do its bidding.
The U.S. suffered 34 percent of global ransomware infections last year - and it's no wonder why, with 64 percent of Americans willing to pay to retrieve their encrypted files, compared to 34 percent of victims worldwide, according to Symantec.
Aga oven owners could have been left scratching their heads over why their food did not cook properly if not for a researcher at Pen Test Partners.
Researchers in the UK have uncovered a technique for malicious websites to spy on smart device owners and even decipher their screen touches and PIN number entries by secretly monitoring their devices' sensor data.
The security firm Radware has come across two new forms of Denial of Service (DOS) malware that is attacking and bricking Internet of Things devices for as yet unknown reasons.
The recently uncovered Chrysaor spyware tool has an amazingly complex and stealthy way to record audio that is able to fly under the user's radar.
A proof of concept test has shown that some smart TVs can be hacked using just common radio signals that can give a hacker control over the television's camera and mic to view who is viewing.
A newer and more potent version of Mirai malware was used last month to pummel an unnamed U.S. college with a 54-hour long distributed denial of service (DDoS) attack.