Tag: software

Start-Up Claroty Has Eye On Industrial Control System Threats

In-brief: Claroty, an Israel-based start-up emerged from stealth mode on Tuesday, unveiling a new platform that it claims will help owners of industrial control systems detect threats and attacks by sophisticated adversaries. 

Justice Dept. studying national security threats of Internet of Things devices

Reuters is reporting that the U.S. Justice Department has formed a threat analysis team to study potential national security challenges posed by self-driving cars, medical devices and other Internet-connected tools. The new group’s goal is to secure the so-called “internet of things” from exploitation by “terrorist threats” and by others who might try to hack devices to cause loss of life or achieve political or economic gain, according to Assistant Attorney General John Carlin, head of the Justice Department’s national security division. The impetus for the team, which has been informally active for about six months, was an understanding that the internet is vulnerable to cyber attacks partly because it was not designed with security in mind, Carlin told Reuters, after announcing the group on Thursday at the Intelligence and National Security Alliance conference in Washington. Source: Justice Dept. group studying national security threats of internet-linked devices

Short Sheet: Researchers Raise Doubts on St. Jude Device Hack

In-brief: The battle of words over the security of devices by St. Jude Medical continued on Tuesday, as researchers from University of Michigan raised questions about claims that security researchers had actually “crashed” implantable pace makers. 

Samsung Taps Security Start-up Darktrace for IoT Protection

In-brief: Samsung’s SDS global IT services group inked a deal with the security start-up Darktrace last week that, according to reports, will also result in collaboration around security for IoT devices.

Beware: Targeted Attacks on iPhone Users are a Thing | Lookout Blog

In-brief: Lookout said it identified an active threat that was using three critical iOS zero-day (that is: previously unknown) vulnerabilities. When exploited, the three vulnerabilities “form an attack chain that subverts even Apple’s strong security environment.”