New law will issue bans, fines for using default passwords on smart devices
The UK government has just introduced new law to protect consumers from internet-connected smart devices that use default passwords.
150,000 Verkada security cameras hacked—to make a point
Hospitals, banks, police departments, prisons, schools, and companies like Tesla and Cloudflare are victims of an attack on Verkada.
IoT cybersecurity bill passed by Senate
The US Senate passed a bill to improve security guidelines and protocols for Internet of Things devices purchased and owned by the Federal government.
IoT forecast: Running antivirus on your smart device?
Cybersecurity for the Internet of Things (IoT) could look a lot like the cybersecurity overall in the future, including running antivirus on devices.
A week in security (November 9 – November 15)
In this week in security (November 9 – November 15), we look at RegretLocker, the future of IoT cybersecurity, and far more.
Lock and Code S1Ep19: Forecasting IoT cybersecurity with John Donovan and Adam Kujawa
This week on Lock and Code, get a backstage pass to a Malwarebytes employee cybersecurity training about the future of protecting the Internet of Things.
Chaos in a cup: When ransomware creeps into your smart coffee maker
This International Coffee Day, we looked at coffee machines that helped bring down a network of systems. Who would’ve guessed?
Lock and Code S1Ep10: Pulling apart the Internet of Things with JP Taggart
This week on Lock and Code, we talk to JP Taggart, senior security researcher at Malwarebytes, about the Internet of Things.
End of line: supporting IoT in the home
Warranties which may not warranty, certificates which might fail to certify, lifespans which don’t match the length of cover promised. This could be IoT.
The little-known ways mobile device sensors can be exploited by cybercriminals
Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.