Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
News & Commentary
How to Assess More Sophisticated IoT Threats
Jack Mannino, CEO, nVisiumCommentary
Securing the Internet of Things requires diligence in secure development and hardware design throughout the product life cycle, as well as resilience testing and system component analysis.
By Jack Mannino CEO, nVisium, 7/6/2020
Comment0 comments  |  Read  |  Post a Comment
7 IoT Tips for Home Users
Steve Zurier, Contributing Writer
Whether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep everyone secure.
By Steve Zurier Contributing Writer, 7/2/2020
Comment0 comments  |  Read  |  Post a Comment
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark ReadingNews
A series of IoT vulnerabilities could put hospital networks, medical data, and patient safety at risk.
By Kelly Sheridan Staff Editor, Dark Reading, 6/30/2020
Comment12 comments  |  Read  |  Post a Comment
COVID-19 Puts ICS Security Initiatives 'On Pause'
Nicole Ferraro, Contributing WriterNews
Security pros concerned that increased remote access to vulnerable operational technology and stalled efforts to harden OT environments puts critical infrastructure at greater risk.
By Nicole Ferraro Contributing Writer, 6/30/2020
Comment1 Comment  |  Read  |  Post a Comment
Another Record-Breaking DDoS Attack Signals Shift in Criminal Methods
Ericka Chickowski, Contributing WriterNews
Malicious botnet sources explode in new attacks that push boundaries in terms of volume and duration.
By Ericka Chickowski Contributing Writer, 6/25/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Acquires IoT/OT Security Firm CyberX
Dark Reading Staff, Quick Hits
Deal extends Microsoft Azure for legacy industrial devices.
By Dark Reading Staff , 6/22/2020
Comment1 Comment  |  Read  |  Post a Comment
Firmware Flaw Allows Attackers to Evade Security on Some Home Routers
Robert Lemos, Contributing WriterNews
Networking devices sold under at least one major brand have a firmware vulnerability that allows hackers to take control of the device, a cybersecurity firm claims.
By Robert Lemos Contributing Writer, 6/22/2020
Comment0 comments  |  Read  |  Post a Comment
What Will Cybersecurity's 'New Normal' Look Like?
Curtis Franklin, Security Editor
The coronavirus pandemic has forced changes for much of the business world, cybersecurity included. What can we expect going forward?
By Curtis Franklin Security Editor, 6/19/2020
Comment2 comments  |  Read  |  Post a Comment
'Ripple20' Bugs Plague Enterprise, Industrial & Medical IoT Devices
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers discover 19 vulnerabilities in a TCP/IP software library manufacturers have used in connected devices for 20 years.
By Kelly Sheridan Staff Editor, Dark Reading, 6/16/2020
Comment0 comments  |  Read  |  Post a Comment
IoT Security Trends & Challenges in the Wake of COVID-19
Tanner Johnson, Senior Analyst, Connectivity & IoT, OMDIACommentary
The demand for Internet of Things security practices that protect sensitive medical equipment and data will double within the next five years. Here's why.
By Tanner Johnson Senior Analyst, Connectivity & IoT, OMDIA, 6/16/2020
Comment0 comments  |  Read  |  Post a Comment
When Your Biggest Security and Privacy Threats Come From the Ones You Love
Ericka Chickowski, Contributing WriterNews
Research examines the risks and design challenges of accounting for privacy threats in intimate relationships.
By Ericka Chickowski Contributing Writer, 6/10/2020
Comment0 comments  |  Read  |  Post a Comment
Asset Management Mess? How to Get Organized
Joan Goodchild, Contributing WriterNews
Hardware and software deployments all over the place due to the pandemic scramble? Here are the essential steps to ensure you can find what you need -- and secure it.
By Joan Goodchild Contributing Writer, 6/10/2020
Comment1 Comment  |  Read  |  Post a Comment
Social Distancing for Healthcare's IoT Devices
Ori Bach, CEO of TrapX SecurityCommentary
Security pros need to double down around prevention of lateral movement by attackers, especially if IoT devices are connected to the network.
By Ori Bach CEO of TrapX Security, 6/3/2020
Comment0 comments  |  Read  |  Post a Comment
26 IoT Flaws Enable Denial-of-Service Attacks, Privilege Escalation
Dark Reading Staff, Quick Hits
Research details vulnerabilities in the Zephyr Real Time Operating Systems and MCUboot, both used in IoT devices and sensors.
By Dark Reading Staff , 6/1/2020
Comment0 comments  |  Read  |  Post a Comment
Most Bluetooth Devices Vulnerable to Impersonation Attacks
Jai Vijayan, Contributing WriterNews
Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.
By Jai Vijayan Contributing Writer, 5/21/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Reportedly in Talks to Acquire CyberX
Dark Reading Staff, Quick Hits
CyberX was founded in 2013 and has raised $48 million to build its cybersecurity platform for IoT and industrial control systems.
By Dark Reading Staff , 5/6/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Challenges Security Researchers to Hack Azure Sphere
Kelly Sheridan, Staff Editor, Dark ReadingNews
Participants can earn up to $100,000 for finding severe flaws in Microsoft's Linux-based Azure Sphere IoT operating system.
By Kelly Sheridan Staff Editor, Dark Reading, 5/5/2020
Comment1 Comment  |  Read  |  Post a Comment
Designing Firmware Resilience for 3 Top Attack Vectors
Burzin Daruwala, Senior Offensive Security Researcher Manager,  Intel Corp.Commentary
Firmware has become an increasingly prevalent target for hackers. Here's how to stop them.
By Burzin Daruwala Senior Offensive Security Researcher Manager, Intel Corp., 5/5/2020
Comment0 comments  |  Read  |  Post a Comment
Industrial Networks' Newest Threat: Remote Users
Dave Weinstein, Chief Security Officer, ClarotyCommentary
We know remote working isn't going away anytime soon, so it's crucial we be extra vigilant about security for industrial networks and critical infrastructure.
By Dave Weinstein Chief Security Officer, Claroty, 5/1/2020
Comment0 comments  |  Read  |  Post a Comment
Health Prognosis on the Security of IoMT Devices? Not Good
Nicole Ferraro, Contributing WriterNews
As more so-called Internet of Medical Things devices go online, hospitals and medical facilities face significant challenges in securing them from attacks that could endanger patients' lives.
By Nicole Ferraro Contributing Writer, 4/25/2020
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Qualitybacklinks
Current Conversations yes, i hope so
In reply to: Re: Affected devices
Post Your Own Reply
Posted by FlynneTrobe
Current Conversations yes, i hope so
In reply to: Re: Affected devices
Post Your Own Reply
More Conversations
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5595
PUBLISHED: 2020-07-07
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a buffer overflow vulnerability, which may allow a remote attacker to stop the network functions of the products or execute...
CVE-2020-5596
PUBLISHED: 2020-07-07
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) does not properly manage sessions, which may allow a remote attacker to stop the network functions of the products or execute a mali...
CVE-2020-5597
PUBLISHED: 2020-07-07
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a null pointer dereference vulnerability, which may allow a remote attacker to stop the network functions of the products o...
CVE-2020-5598
PUBLISHED: 2020-07-07
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper access control vulnerability, which may which may allow a remote attacker tobypass access restriction and stop ...
CVE-2020-5599
PUBLISHED: 2020-07-07
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability, which may allow a remo...