DDoS

Satori malware made public

As Checkpoint researchers discovered earlier this week, a variant of Mirai malware dubbed Satori was used to attack hundreds of thousands of Huawei home routers in the past several weeks. Now the Satori exploit code used in the attack is now public, Threatpost reports. Researchers further warn that the malicious code could quickly be used to launch common DDoS attacks […]

Satori malware made public Read More »

IoT Cyber Attack Methods And Ways To Defend Them

In a recent cyber threat report, McAfee provided some good intelligence on how cybercriminals use Mirai attacks to infect poorly configured Internet of Things (IoT) devices and turn them into bots used for large scale network attacks.

IoT Cyber Attack Methods And Ways To Defend Them Read More »

Secure Authorization, Authentication and Access Control for IoT

To help organizations prepare for Internet of Things (IoT) threats, we outline some key security recommendations for IoT authorization, authentication and access control.

Secure Authorization, Authentication and Access Control for IoT Read More »

Improving Data Security with Secure Communications, Applications and APIs for IoT

Security firm Sucuri warned back in June how compromised CCTV devices were used in multiple denial-of-service (DDoS) attacks every day. In the report, nearly 25,000 compromised devices from all over the world were used in various attacks on small businesses.

Improving Data Security with Secure Communications, Applications and APIs for IoT Read More »

Hardware-based Security Controls for IoT

In this article, we highlight some key points from a recent Cloud Security Alliance (CSA) IoT report, to include hardware-based controls to enhance security of IoT products. The CSA IoT Working Group report, is titled “Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products.”

Hardware-based Security Controls for IoT Read More »