Internet of Things

A network of testing facilities will assess the security of medical devices.

Exclusive: WHISTL Labs will be Cyber Range for Medical Devices

In-brief:  A global federation of labs will test the security of medical devices, according to an announcement on Monday by a consortium of healthcare industry firms, universities and technology firms.

Security cameras by the firm Axios were just one of potentially thousands of connected devices that harbor a software hole dubbed Devils Ivy. (Graphic courtesy of Axios.)

Security Camera Flaw could lurk in Thousands of Devices

In-brief: a vulnerability dubbed “Devil’s Ivy” affects hundreds of cameras by the firm Axios and – likely – thousands of other devices made by some of the world’s top technology brands. It’s another example of widespread software supply chain security risks.

With an Eye on IoT Security ARM buys Simulity for $15m

With an Eye on IoT Security ARM buys Simulity for $15m

In-brief: ARM’s purchase of Simulity adds the ability to do over the air updates to embedded SIM chips and highlights ARM’s efforts to build out security and management at IoT scale. 

More perp walks like the recent arrest in The Czech Republic will send a powerful message to would-be cyber criminals.

Fired Employee Hacked Smart Water Meters Just to be a Jerk

In-brief: A man in Pennsylvania said he was just being a disgruntled former employee when he hacked into base stations owned by his ex-employer that control access to smart water meters and disrupted the business of municipal water utilities across three states. He faces jail time, probation and a fine for his actions.

Internet of Things Highway Signpost with  wording on Sky Background.

Kaspersky: Malware Attacks on IoT More Than Double Those in 2016

In-brief: As of May 2017, Kaspersky Lab researchers have observed more than 7,200 different samples of malware for IoT devices in honeypot activity—more than double the number from last year–demonstrating that IoT devices are becoming increasingly vulnerable on a number of fronts, including passwords, firmware, and telnet/SSH ports.