Post Tagged with: "hacking"

A Good Housekeeping Seal for the Connected Home?

April 21, 2015 21:340 comments
A Good Housekeeping Seal for the Connected Home?

In-brief: Experts on the security of the Internet of Things warned that lax security and privacy protections are rampant in connected home products, but consumers have no way of knowing whether the products they buy are easy targets for hackers. 

Read more ›

Verizon: Internet of Things Hacks Pose Little Risk – For Now

April 15, 2015 14:391 comment
Verizon said that threats from Internet of Things technologies were more theory than practice in 2014, but that 2015 could see IoT devices play a role in breaches.

In-brief: Verizon said in its latest Data Breach Investigations Report that threats from Internet of Things technologies were more theory than practice in 2014, but that 2015 could see IoT devices play a role in breaches.

Read more ›

With Executive Order, Cyber Criminals Join Terrorists, Traffickers on Sanctions List

April 1, 2015 11:320 comments
President Barack Obama signed an Executive Order on Wednesday that put cyber crimes on par with others that can result in sanctions against malicious actors and those who support them.

In-brief: An Executive Order signed by President Obama on Wednesday will clear the way for cyber criminals to face the same sanctions as terrorist groups, illegal arms dealers and drug traffickers. One expert called the Order “momentous.” 

Read more ›

Supply Chain Hackers Use Short List of Techniques | Trend Micro

March 31, 2015 11:161 comment
Trend Micro describes some of the most common supply chain attack techniques in a blog post.

In-brief: Trend Micro notes that supply chain attacks are on the rise, with attackers relying on a short list of techniques including compromises of source code, firmware and so-called “watering hole” attacks.

Read more ›

Is Google’s Rowhammer the Future of IoT Attacks?

March 30, 2015 14:410 comments
Is Google’s Rowhammer the Future of IoT Attacks?

In-brief: Infoworld’s Roger Grimes makes the case that Google’s recent Rowhammer exploit may be a sign of things to come as attackers look for common platforms to attack the Internet of Things. 

Read more ›