What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in IoT

Patch ‘Em or Weep: Study Reveals Most Vulnerable IoT, Connected Assets

Phones, tablets and workstations with unpatched CVEs are a clear and present danger. New Armis study lists the most vulnerable. Image: AndSus/Adobe Stock Asset visibility and security company Armis identified connected assets posing the greatest risks to global enterprise. Armis’ new research, based on analysis from its Asset Intelligence Engine, . . . Read more

S3 Ep149: How many cryptographers does it take to change a light bulb?

by Paul Ducklin HOW MANY CRYPTOGRAPHERS? No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify and anywhere that good podcasts are found. Or just drop the . . . Read more

S3 Ep130: Open the garage bay doors, HAL [Audio + Text]

by Paul Ducklin I’M SORRY, DAVE, I’M AFRAID… SORRY, MY MISTAKE, I CAN DO THAT EASILY No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify, Stitcher . . . Read more

US government warning! What if anyone could open your garage door?

by Paul Ducklin Cybersecurity researcher Sam Sabetan yesterday went public with insecurity revelations against IoT vendor Nexx, which sells a range of “smart” devices including door openers, home alarms and remotely switchable power plugs. According to Sabetan, he reported the bugs to Nexx back in January 2023, but to no . . . Read more

How internet-facing webcams could put your organization at risk

By exploiting webcams and other IoT devices, hackers can spy on private and professional conversations, potentially giving them access to sensitive information, says BitSight. Image: Peter/Adobe Stock Imagine a cybercriminal hacking into an internet-facing webcam set up in your organization and spying on a meeting, a manufacturing process or an . . . Read more