Archive for the ‘Top Stories’ Category

Five Billion Tests Later: IoT and Industrial Control System Protocols Raise Alarms

August 9th, 2017

In-brief: Close to five billion “fuzzing” tests conducted during 2016 reveal protocols used by industrial control systems, vehicles and Internet of Things devices to be weaker, on average, with many crashing hundreds of times and revealing vulnerabilities that could be used by malicious actors.  A study of 4.8 billion automated…

Read the whole entry… »

Related Stories

Posted in connected devices, critical infrastructure, fuzzing, Internet of things, protocol, published research, Reports, software, software development, supply chain, survey, Top Stories, trends, vulnerabilities | Comments (0)

AlphaBay, the Largest Online “Dark Market,” Shut Down | Department of Justice

July 21st, 2017

The Justice Department on Thursday said that it shut down AlphaBay, what it described as “the largest criminal marketplace on the internet,” more than two weeks after the market went dark. The site was used to sell a wide range of contraband to a customer base of some 200,000 individuals worldwide, the DOJ said in a statement. Among…

Read the whole entry… »

Related Stories

Posted in Top Stories | Comments (0)

With an Eye on IoT Security ARM buys Simulity for $15m

July 14th, 2017

In-brief: ARM’s purchase of Simulity adds the ability to do over the air updates to embedded SIM chips and highlights ARM’s efforts to build out security and management at IoT scale.  A tiny deal this week by ARM could have a big impact on the security of the Internet of Things. The company, which makes a wide range of low power…

Read the whole entry… »

Related Stories

Posted in ARM, connected devices, hardware, harman, Internet of things, M&A, mirai, Network, OTA update, over the air update, Patching, Platform, sensor, SIM card, smart infrastructure, software, Top Stories | Comments (0)

Chinese and Russian Hackers Mining Shadow Brokers Release

April 25th, 2017

In-brief: Chinese and Russian hacking crews are making short work of a clutch of new hacking tools released by the group Shadow Brokers and purportedly stolen from the NSA. Attacks using the tools may already be taking place.  Chinese and Russian hacking crews are making short work of a clutch of new hacking tools released by the group Shadow…

Read the whole entry… »

Posted in Top Stories | Comments (0)

Security Ledger Voted Top Infosec Podcast

March 13th, 2017

In-brief: The Security Ledger Podcast had the honor of being named one of the 35 top podcasts covering information security. In honor of that honor, we’re reprising some of our most popular broadcasts from recent months.  The Security Ledger Podcast had the honor of being named one of the 35 top podcasts covering information security! The…

Read the whole entry… »

Posted in Breaking Security News, Digital Guardian, Podcasts, Reports, standards, Top Stories, trends | Comments (0)

Robot Problems: Research Reveals Cybersecurity Woes

March 1st, 2017

In-brief: a report by the firm IOActive warns that industrial and home robots may be vulnerable to remote, software based attacks.  The term “robot” comes from the Czech word robota, meaning “forced labor.” And, while we might like to think of them as aspirational creations – marvels of engineering and maybe even…

Read the whole entry… »

Posted in hardware, IOActive, Reports, robot, Robotics, software, surgical robot, Top Stories, trends, vulnerabilities | Comments (0)

Paul Roberts: How Machine Learning Supplements Security Workforce

February 18th, 2017

“One of the ways companies are compensating increasingly (for the current IT employment shortfall) is with machine learning and artificial intelligence, as a way to do more with less,” says Paul Roberts, Editor-in-Chief at The Security Ledger, in our conversation at the 2017 RSA Conference in San Francisco.Roberts was referring to the current and urgent shortage of skilled security professionals in the IT industry. Even if a company or enterprise doesn’t have the essential staff they need, they still need to maintain security, and automation appears to be the most successful technique used to bridge that gap. Source: Paul Roberts: How Machine Learning Supplements Security Workforce


Definitive Guide to DLP

Posted in Top Stories | Comments (0)

Beyond the CES Hype: No Easy Fixes for Security and Privacy Woes

January 6th, 2017

In-brief:Security and privacy risks from connected devices are likely to persist, with no easy fix for what experts agree are widespread problems. The annual Consumer Electronics Show kicked off this week in Las Vegas – the show’s 50th year and bigger than ever. Some 3,800 companies are on hand, more than 100,000 attendees and 2.6 million square feet of exhibit space. Smart devices designed to be connected to the Internet of Things are all the rage again this year. Smart TVs and mobile phones are in abundance, of course, but there’s a dizzying array of other gear, too, ranging from a smart washer and dryer from Samsung to wearable technology to a concept car by Bosch that features face recognition and gesture control. But behind the glitz and excitement of new products, features and capabilities lurk serious security and privacy concerns that experts agree will not be easy to resolve. Among […]


Definitive Guide to DLP

Posted in CES, conferences, connected devices, Internet of things, Mobile, Mobile Threats, Online Trust Association, Senrio, Senrio (Xipiter), software, Top Stories | Comments (0)

Amazon, Microchip team on chip to protect IoT | IEEE Spectrum

December 26th, 2016

In-brief: MicroChip and Amazon are partnering on a chip designed to pair with Amazon’s IoT cloud and provide cryptographically strong identities for IoT devices. There is an interesting piece on a collaboration between Microchip Technology and Amazon.com on a chip that’s designed to work with Amazon’s cloud services and protect connected devices from certain forms of attack. According to the article, the two firms are marketing an add-on chip called the AWS-ECC508 that works with Amazon’s IoT Cloud, creating a cryptographically secure path between IoT endpoint, cloud services and end user. From the article: The AWS-ECC508 is designed to provide end-to-end security between the IoT device and the cloud infrastructure. It does this by leveraging Amazon’s mutual authentication system, which verifies the identity of the cloud service and the device before any data or commands are accepted. The identities are based on cryptographic keys. Until now, creating such cryptographic identities […]


Definitive Guide to DLP

Posted in amazon, Amazon Web Services, connected devices, hardware, Internet of things, Microchip, Platform, processors, sensor, Top Stories, trends | Comments (0)

The IoT: Gateway for enterprise hackers | CSO Online

December 9th, 2016

The Internet of Things keeps growing – and so do the threats. At a webinar this week, a panel warned enterprises that it is crucial to be able to see radio-enabled devices on the network, or they could be blind to the risks they pose. Source: The IoT: Gateway for enterprise hackers | CSO Online


Definitive Guide to DLP

Posted in Top Stories | Comments (0)