Reflecting on Forrester 2020 IoT prediction for new digital services

Credit to Author: Cyril Perducat| Date: Mon, 20 Jan 2020 13:00:35 +0000

As we embark on this new year, I would like to reflect on Forrester’s 2020 IoT prediction related to new ways for old companies to do business in the digital… Read more »

The post Reflecting on Forrester 2020 IoT prediction for new digital services appeared first on Schneider Electric Blog.

Read more

Is OT security ready for the next wave of cybercrime?

Credit to Author: Christophe Blassiau| Date: Thu, 16 Jan 2020 13:46:02 +0000

Forrester’s Predictions 2020: The Internet of Things report has an eye-opening forecast on cybercrime for the coming year – an IoT prediction that demands that we collectively consider how to… Read more »

The post Is OT security ready for the next wave of cybercrime? appeared first on Schneider Electric Blog.

Read more

Google suspende a Xiaomi del Home Hub por vulnerabilidades de privacidad en sus cámaras

Credit to Author: Naked Security| Date: Wed, 08 Jan 2020 14:32:58 +0000

Google ha suspendido temporalmente las cámaras IP de Xiaomi de su servicio Home Hub después de que un usuario informara que estaba viendo imágenes de dispositivos de otras personas. Google Home Hub es la respuesta de la empresa al Echo de Amazon: un sistema de automatización del hogar conectado a Internet controlado a través de [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/yN_h3LNJswA” height=”1″ width=”1″ alt=””/>

Read more

How to secure your IoT deployment during the security talent shortage

Credit to Author: Todd VanderArk| Date: Tue, 17 Dec 2019 17:00:41 +0000

It’s complex work to define a security strategy for IoT—especially with a 3-million-person shortage of cybersecurity pros. But there is a way to augment existing security teams and resources.

The post How to secure your IoT deployment during the security talent shortage appeared first on Microsoft Security.

Read more

The little-known ways mobile device sensors can be exploited by cybercriminals

Credit to Author: Logan Strain| Date: Wed, 11 Dec 2019 17:51:03 +0000

Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.

Categories:

Tags:

(Read more…)

The post The little-known ways mobile device sensors can be exploited by cybercriminals appeared first on Malwarebytes Labs.

Read more