News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Numerous security gaps in IoT devices, routers & health apps
B2B Cyber ​​Security ShortNews

Digital consumer protection: Numerous security gaps in IoT devices, routers & health apps. Study by the TÜV association and investigations by the BSI reveal many security gaps. Due to technological progress and an ever-increasing range of new digital consumer products, the digital consumer market continues to grow. At the same time, however, it also offers new attack surfaces for cyber criminals. So what about IT security? The Federal Office for Information Security (BSI) investigated this question. And discovered numerous security deficiencies in IoT devices, WiFi routers and health apps. Countless security incidents in the IoT area First ...

Read more

IoT: lock side entrances

IoT - the Internet of Things continues to expand. Not only does the home office contribute to this. Smart hardware is finding ever broader application possibilities. However, this also increases the area of ​​attack and risk. Manufacturers and users are equally asked to ensure more security. The dangers of the Internet of Things are becoming more diverse: Employees access the company network more often from home, while at the same time they use smart devices privately. This trend continues: According to the analysts at BERG Insight, annual growth of 20,2 percent is expected in Europe. So increase ...

Read more

20.5.21/XNUMX/XNUMX webinar: IoT security - this is how companies protect themselves
F Secure News

Attend F-Secure's free online seminar on "IoT security basics: How companies protect themselves" on May 20, 2021 from probably 10:00 to 10:30 a.m. The transparency in your own company network will also be endangered in 2021 by the use of Internet-of-Things (IoT) devices. Not knowing what the devices send back and what kind of influence an attacker can gain on the device - and therefore on the data - is still one of the biggest disadvantages of buying "smart" devices. Online seminar on May 20.05.21th, 10.00 at XNUMX:XNUMX a.m. If a secure…

Read more

Hack: 150.000 security cameras tapped
AvastNews

In a cyber attack on the security camera manufacturer Verkada, the data from over 150.000 cameras - with live feeds in hospitals, schools, prisons and companies (such as Tesla) - were tapped. A statement from Nick Viney, Avast Senior Vice President Partner. The cyber attack on the security camera provider Verkada is not an IoT hack in itself, but an attack on the company network. Nevertheless, this case shows once again how urgent it is to protect the data collected by IoT devices. The video surveillance market will grow to $ 2025 billion by 75, and companies that ...

Read more

Neurons manages IoT devices in healthcare
ivanti news

Ivanti extends the Neurons platform to manage IoT devices in healthcare and helps with management and protection. The whole thing can also be integrated into the MobileIron Cloud. Ivanti, has released Ivanti Neurons ™ for Healthcare, which improves the management of medical IoT devices and enables security teams to proactively identify and remediate vulnerabilities. Ivanti Neurons can also be integrated into the MobileIron Cloud and offers companies a central platform for devices with self-healing and self-securing functionalities as well as self-service for end users. With the new Application Service Mapping add-on for Ivanti ...

Read more

IoT search engines: curse or blessing?
Eset_News

Are IoT search engines like Shodan or Censys a blessing or a curse? An ESET security expert takes a critical look at Shodan and Censys. Shodan and Censys are search engines for the Internet of Things (IoT). With these portals, devices and systems can be permanently connected to the Internet. These include, for example, surveillance cameras, webcams, servers, PCs, smart home systems, industrial controls or various network components. Both services see themselves as helpers to improve IT security. Security solutions for companies and private users, however, recognize these queries as potential attacks. In his current article "Shodan and Censys - Friend or ...

Read more

Corona accelerates digitization
Digitization from home office

Technological development and digitization will continue to pick up speed in 2021 - "Corona catapults us into 2030", says Stefan Ried, Principal Analyst at Cloudflight, on the twelve most important technology trends of the coming year. Rarely in our history has there been a year in which external circumstances have changed as radically as they did last year. Corona has given digitization a boost that will continue in 2021. At the same time, acceptance or rejection of certain technologies will change as rapidly as we otherwise experience within a decade. In this…

Read more

New IPStorm variant targets IoT devices
IoT Internet of Things

New InterPlanetary Storm malware variant targets IoT devices. The infected devices open back doors for cryptomining, DDoS and other large-scale attacks. The cybercriminal organization behind the InterPlanetary Storm malware has released a new variant that, in addition to Windows and Linux computers, now also targets Mac and Android devices. The malware is building a botnet that currently includes around 13.500 infected computers in 84 different countries around the world, and that number continues to grow. After Windows and Linux now IoT devices The first variant of InterPlanetary Storm, which was aimed at Windows computers, was revealed in May 2019, and ...

Read more

Protection for emerging 5G networks
5G radio mast

Trend Micro protects newly emerging private 5G networks and edge computing in companies and reaches the proof-of-concept phase (POC) in the process. Trend Micro announces Mobile Network Security (MNS), a security solution for mobile networks. MNS accelerates digital innovation at the network edge by providing comprehensive network and endpoint protection for a new era of private IoT and 5G networks. Service providers and system integrators are increasingly using shared and unlicensed products to build private cellular networks for their corporate customers. This leads to new business opportunities in 5G and IoT. For business-critical applications at the edge of the network "From shopping centers to airports and intelligent ...

Read more