Security Vulnerability in Saflok’s RFID-Based Keycard Locks

It’s pretty devastating: Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security ...
AI ML IoT security NicheStack edge computing IoT Security

IT Leaders Lack Confidence in IoT Security Plans

There is a significant lack of confidence among IT leaders regarding their internet-of-things (IoT) security plans ...
Security Boulevard

Future of IoT Live Patching: What to Expect in Cybersecurity

Unpatched devices often have known security vulnerabilities that could be exploited by attackers IoT live patching keeps devices online and operational even during security updates, reducing downtime Automated patching solutions like KernelCare ...
An electric toothbrush (that’s not part of a DDoS botnet)

‘Total Bollocks’ — No, Your Toothbrush isn’t DDoS’ing

PR FAIL: Were 3 million toothbrushes hacked into a botnet? Or does a Fortinet spokeschild have egg on his face? ...
Security Boulevard
Understanding the Connection Between IoT Vulnerabilities and Home Network Intrusions

Understanding the Connection Between IoT Vulnerabilities and Home Network Intrusions

Our homes are increasingly becoming a web of interconnected devices. From smart thermostats to connected refrigerators, the Internet of Things (IoT) has revolutionized how we interact with our home environments. However, with ...

Sierra Flaws Cyber Attack: Router Vulnerabilities Unveiled

In a recent scrutiny of Sierra wireless routers, Forescout’s Vedere Labs uncovered 21 novel vulnerabilities that, though relatively straightforward to exploit, pose historical challenges for enterprises to rectify. Forescout’s Vedere Labs outlined ...

A Robot the Size of the World

In 2016, I wrote about an Internet that affected the world in a direct, physical manner. It was connected to your smartphone. It had sensors like cameras and thermostats. It had actuators: ...