IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | October 26, 2018

IOActive Highlights Security Issues and Concerns for Smart Cities

Techspective – There are a variety of potential benefits for cities that embrace technology. “Smart cities” can implement technology to streamline functionality and improve efficiency in a number of ways from detecting when a public parking lot is full to enabling remote wireless control of traffic signals. Of course, connecting the infrastructure of a city and making it remotely accessible and manageable also exposes it to potential risk and malicious activity.

ARTICLE | October 22, 2018

The most interesting Internet-connected vehicle hacks on record

ZDnet – As researchers turn their attention to vehicles, we’ve seen everything from sending drivers into a ditch to brakes which suddenly won’t work.

ARTICLE | October 18, 2018

Industry experts weigh in on UK’s new IoT guidelines

The Daily Swig – The UK government’s new code of practice for Internet of Things (IoT) devices has been widely welcomed as a step towards implementing security by design – though many within the industry say it doesn’t go far enough to protecting consumers or organizations.

ARTICLE |

New Security Woes for Popular IoT Protocols

Dark Reading – Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.

ARTICLE | October 16, 2018

Can your flight be hacked?

Financial Times – It took Robert Hickey and his team of researchers just two days to do what the aerospace industry had insisted was nigh impossible. On September 21 2016, the US Department of Homeland Security official hacked into the systems of a Boeing 757 passenger aircraft parked in the airport in Atlantic City, New Jersey.

ARTICLE |

UK Launches “World First” IoT Code of Practice

Infosecurity Magazine – The UK government claims to be leading the way with a newly released Code of Practice (CoP) designed to drive security-by-design in the manufacture of IoT products.

ARTICLE | October 15, 2018

IoT security: Government unveils Code of Practice – but it’s voluntary

Internet of Business – The UK government has launched a new voluntary Code of Practice for the manufacturers of Internet of Things devices, with the aim of securing the consumer IoT. The Code is designed to ensure that devices such as home hubs, smart kitchen appliances, security cameras, wearables, and connected toys are secure against external attack and data breaches.

ARTICLE |

Consumer IoT code of practice

Professional Security Magazine – A code of practice by UK Government for security of consumer IoT (Internet of Things) products has been welcomed. While voluntary, its 13 guidelines may help with compliance with data protection laws, such as the UK’s Data Protection Act 2018 and the European Union-wide General Data Protection Regulation (GDPR).

ARTICLE |

IoT security: Follow these rules to protect your users from hackers, gadget makers told

ZDnet – A government-backed scheme aims to tackle the issue of poor security in the Internet of Things (IoT) by encouraging manufacturers to produce connected devices that are secure by design and easy to update. The Secure by Design code of practice for the IoT has been launched by the Department for Culture, Media and Sport (DCMS) and the National Cyber Security Centre (NCSC) and is based on advice from from industry, security experts, academia, and consumer organisations.

ARTICLE | October 11, 2018

The daily briefing

CyberWire – in the first incident of its kind, an officer of the Chinese intelligence service, the Ministry of State Security (MSS), is in US custody facing hacking charges. Yanjun Xu, a Deputy Division Director in MSS’s Jiangsu State Security Department, Sixth Bureau, was apprehended by Belgian authorities in April and extradited to the US on Tuesday.

Posts pagination

Previous page Page 1 … Page 23 Page 24 Page 25 … Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy