New malware that uses a device’s own computing power to mine Monero can render an Android smartphone unusable, security firm Trend Micro warned Wendesday.
The majority of corporations fear that a “catastrophic” security incident stemming from the Internet of Things (IoT) is an imminent risk. However, those same organizations still lack simple knowledge of how many IoT devices they have in their organization and how they are being used, let alone have oversight for how to protect them, according to new findings.
Internet of Things insecurity is worse than you think, according to a team of researchers who reverse engineered a series of Internet of Things devices and found them even easier to hack and exploit than believed.
The UK government released a draft report calling for a “fundamental shift” in the approach to securing Internet of Things devices. One prominent UK security researcher is unimpressed, however, calling the effort toothless.
Technology developed by researchers at the State University of New York can create a smartphone “fingerprint” from a single photo captured by the device. The technology may clear the way for a new identity verification system that can secure online transactions or protect smartphone owners from identity theft.