D‑Link camera vulnerability allows attackers to tap into the video stream
ESET researchers highlight a series of security holes in a device intended to make homes and offices more secure
ESET researchers highlight a series of security holes in a device intended to make homes and offices more secure
The vulnerabilities, which resided in associated smartphone apps, were both easy to find and easy to fix
The watch has been found to expose its wearers to a high level of risk of being contacted and monitored by attackers
Smart devices were targeted by more than one-half of cyberattacks detected in the country in 2017
The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets
Far-fetched though it may sound, the answer is yes, according to researchers, who show that electrical grids and smart home appliances could make for a dangerous mix
The security implications of devices connecting and sharing data
More than three dozen cybercrime and digital forensics experts from 23 countries have investigated a simulated attack on a bank that had been carried out through an IoT device.
The big challenge with IoT devices is that they are all different: Each manufacturer has its own firmware, uses different protocols, and designs its own architecture. So, the first step before carrying out any analysis is to understand the architecture, find out what components are involved, and how they interact and communicate among themselves.
The Internet of Things (IoT) can be a network of connected convenience but this should not come at the expense of safeguarding your privacy and the personal data that connected devices collect and share.
It is not feasible, in fact not even possible, to replace all CPUs in all devices. It would be too costly, besides the success rate for unsoldering and resoldering pin-throughs in multi-layer boards will never be 100%.
For years, IoT security seemed like solving a problem that didn’t exist. Not anymore says ESET's Cameron Camp, who was at this year's CES.
IoT attacks are on the rise. As the technology becomes more relevant to our lives, we take a look at what the state of play is.
It seems the current DDoS tactics from cybercriminals is to gain control over millions of IoT devices and direct their power towards any target they choose.
IoT devices, while extremely useful for simplifying various mundane aspects of everyday life, also offer criminals a new attack platform: your appliances.
IoT security matters more than ever, explains ESET's Cameron Camp, as the technology, which offers us so much, is vulnerable to attack from cybercriminals.
The current hype, this Christmas and beyond, is the connected toy. Not sure what that means? Well, here are seven things you need to know about this increasingly popular plaything.
A new report found hundreds of serious security flaws in some of the most popular Internet of Things gadgets - the problem is far deeper than thought, with 70% of the most popular such gadgets having serious security flaws.
Google’s Nest thermostat can be hacked in under a minute, according to a blog post and video posted by GTV Hacker. The hack would allow attackers complete control over the device and access to the user’s home network.