Security is the key to the success of any digital project, whether you are connecting critical infrastructure, industrial Internet of Things (IoT), or delivering data and telemetry to reduce costs and increase revenue. We have long advocated the need for a holistic approach to IoT security, and with it, shared the vital role the network plays in embedding security. To further … [Read more...] about The Criticality of the Network in Securing IoT and Critical Infrastructure
IoT
High-Severity PrinterLogic Flaws Enable Remote Code Execution
The three flaws enable an unauthenticated attacker to launch remote code execution attacks on printers. Source link … [Read more...] about High-Severity PrinterLogic Flaws Enable Remote Code Execution
Extinguishing the IoT Insecurity Dumpster Fire
Will connected devices be insecure forever? Or will legislation - such as the recent UK mandate announced this week - help boost IoT security? Source link … [Read more...] about Extinguishing the IoT Insecurity Dumpster Fire
Multiple Sierra Wireless AirLink Routers Open to Remote Code Execution
Critical flaws in the software of Sierra Wireless' AirLink routers enable an array of malicious attacks. Source link … [Read more...] about Multiple Sierra Wireless AirLink Routers Open to Remote Code Execution
Critical Flaws Found in Eight Wireless Presentation Systems
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. Source link … [Read more...] about Critical Flaws Found in Eight Wireless Presentation Systems
2 Million IoT Devices Vulnerable to Complete Takeover
Millions of security cameras, baby monitors and "smart" doorbells are open to hijack - and no solution is currently available. Source link … [Read more...] about 2 Million IoT Devices Vulnerable to Complete Takeover