IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | March 21, 2018

Gartner Expects 2018 IoT Security Spending to Reach $1.5 Billion

Dark Reading – Regulations, breach concerns will push spending to over $3 billion by 2021, analyst firm says. Enterprises worldwide will spend $1.5 billion this year protecting their IoT networks and connected devices against a range of security threats, according to new estimates from Gartner.

ARTICLE | March 19, 2018

Security Specialists Displayed Ransomware Attacks On Robots

IHLS (Israel’s Homeland Security) – Security services firm IOActive has warned that tens of thousands of robots are a threat to human safety after its researchers were able to carry out a ransomware attack against two top brands. The alert comes six months after the company warned that the most popular industrial and domestic robot brands have vulnerabilities that could be exploited by cyber attackers.

ARTICLE | March 15, 2018

U.S. Government Accuses Russia of Hacking the Power Grid

eWEEK – A joint Department of Homeland Security and Federal Bureau of Investigation analysis finds evidence that Russia has been actively targeting critical infrastructure in the U.S with cyber-attacks. What should grid operators do in the U.S. to limit risks?

ARTICLE | March 13, 2018

How Long Does It Take Hackers To Pull Off a Massive Job Like Equifax?

Popular Mechanics – How to steal 143 million customer records without anybody noticing. The time it takes hackers to download records depends on how large the files are. A photo contains a heck of a lot of data; a text file listing your name, address, social security number, etc., would be far smaller—especially given that the data could be compressed.

ARTICLE | March 12, 2018

Researchers: Robots Vulnerable to Ransomware

Robotics Business Review – Robotics developers already concerned about security vulnerabilities have another thing to worry about — robot ransomware. Researchers from IOActive today showed a proof-of-concept ransomware attack on two popular service robots — Pepper and NAO — from SoftBank Robotics. They demonstrated the attack at the 2018 Kaspersky Security Analyst Summit in Cancun, Mexico.

ARTICLE |

That robot, like your laptop, could get hacked with ransomware

The Parallax – CANCÚN, Mexico—“Give me bitcoins now, or prepare to die.” The declaration, a clear reference to the cult classic The Princess Bride, came from an otherwise-friendly Nao robot featured in a video designed to demonstrate that, like their computer predecessors that can’t walk or roll down the street, humanoid robots like SoftBank Robotics’ Nao and Pepper are susceptible to ransomware attacks.

ARTICLE | March 10, 2018

What Happens When You Hold Robots for Ransom?

Dark Reading – Researchers explore why an attacker would target robots with ransomware, and the implications of what might happen if they did. Robots are in our homes, businesses, schools, and industrial facilities. They’re builders and service workers, healthcare attendants and customer assistants. As robots continue to proliferate in our lives and human-robot interactions grow, so does the potential for cyberattacks.

ARTICLE |

Robots can be hacked with ransomware & curse at customers

Hackread – Exploitable Vulnerability in Softbank’s NAO and Pepper Robots Leads to Ransomware Infection. According to the findings of security firm IOActive Labs, there is a vulnerability in Softbank Robotics’ NAO and Pepper robots that can lead to devastating ransomware attacks by causing robots deployed at workplaces to stop working.

ARTICLE | March 9, 2018

Pepper the annoying robot infected with ransomware in proof-of-concept attack

www.V3.co.uk – Pepper, an annoyingly chirpy robot, has been infected by malware in proof of concept by security company IOActive. In a paper entitled “Robots Want Bitcoins Too!”, shows how robots like Pepper and NAO, both commercially available and both made by Softbank, can be compromised by malware – even ransomware.

ARTICLE |

What nightmares run on: Robots are vulnerable to ransomware too

CIO Dive – Robots have an increased presence in everyday technology and hackers could take note. In 2017, IOActive found about 50 flaws in robots from varying vendors. Hackers could exploit those vulnerabilities to spy through a robot’s microphone or camera, steal data or even cause “physical harm,” according to the report.

Posts pagination

Previous page Page 1 … Page 32 Page 33 Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy