IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | August 5, 2020

Hackers Found a Simple Way to Mess With Traffic Lights

Wired – In movies like Die Hard 4 and The Italian Job, hijacking traffic lights over the internet looks easy. But real-world traffic-light hacking, demonstrated by security researchers in years past, has proven tougher, requiring someone to be within radio range of every target light.

ARTICLE | August 4, 2020

Top 100 Women in Cybersecurity for 2020

Cyber Defense Magazine – Cyber Defense Magazine reveals the Top 100 Women in Cybersecurity for 2020 list at the Cyber Defense Awards during BlackHat.

ARTICLE | July 17, 2020

Connected Cars, Smart Homes Remain Targets

Security Boulevard – The European Union Agency for Cybersecurity (ENISA) released a smart car safety report detailing how connected cars expand the potential of cyberattacks. Several years ago, IOActive researchers (among others) proved that it’s possible to compromise autonomous vehicle systems, which led to millions of recalls.

ARTICLE | July 13, 2020

What is ransomware? Everything you need to know about one of the biggest menaces on the web

ZDNet –  There’s even the potential that hackers could infect medical devices, putting lives directly at risk. Researchers at IOActive took this once step further by demonstrating how a commercially available robot could come under a ransomware attack.

ARTICLE | June 30, 2020

Researchers Show How Hackers Can Target ICS via Barcode Scanners

Security Week – Hackers previously demonstrated that keystrokes can be remotely injected via an industrial barcode scanner into the computer the scanner is connected to, which could result in the computer getting compromised. IOActive researchers have also been looking at industrial barcode scanners and part of their research, which they described in a blog post, focuses on the scanners used by airport baggage handling systems.

ARTICLE | June 29, 2020

Securing the future of mobility for a post-pandemic world

Intelligent Transport – CAVs especially present a number of security concerns. The increased technology needed to power the vehicle systems can make them more vulnerable to third-party security threats. The potential of such attacks has hit headlines in recent years. A project led by security researchers at Twitter and IOActive saw vehicles remotely hacked through their entertainment systems to reach dashboard functions, steering, brakes and transmission.

ARTICLE | May 22, 2020

IOActive launches Continuous Penetration Testing services

Industrial Cyber – Cybersecurity services provider IOActive announced today the launch of a Continuous Penetration Testing service (CPT).  The new CBT service employs an innovative testing method designed to address the challenge of integrating security testing into an agile development model. As many organizations have moved to Continuous Integration and Continuous Deployment (CI/CD) processes the independent validation and verification processes have not aligned with that enhanced agility until now.

ARTICLE | May 14, 2020

CTO Talk: Q&A with IOActive’s Cesar Cerrudo

Verdict – Cesar Cerrudo is the CTO of IOActive, a security research company that approaches security from the attacker’s mindset. The US firm’s team of security consultants work with some of the world’s largest organisations to find flaws in their cyber defences. As CTO, Cerrudo leads a team of ethical hackers that have hijacked technology throughout the stack, including jeeps and robots, and often presents his research at leading cybersecurity conferences such as Black Hat and RSA.

ARTICLE | May 12, 2020

Cybersecurity Threats to the Food Supply Chain

SecurityWeek – Are cyber criminals likely to attack the food industry? The answer is clearly ‘yes’; and there are at least three obvious channels: hacktivists, cyber-criminal gangs, and nation states. “Moving to more significant automation is going to change the risk profile in a way that a lot of organizations haven’t formerly had to manage – operational technology has not been considered a high-risk priority,” commented John Sheehy, Sr. Vice President at IOActive.

ARTICLE | March 30, 2020

7 Ways Data and AI Can Be Used to Trick and Deceive the Public

Interesting Engineering – Hackers have been shown to be able to hack into the grid — with worrying ease — and use data in order to affect traffic in various ways.

Cesar Cerrudo, an Argentinian security researcher with IOActive examined the vehicle traffic control system installed at major U.S. cities and presented his findings at the Infiltrate conference in Florida. It showed that they can be manipulated to bring traffic to a standstill or to force cars to change their routes.

Posts pagination

Previous page Page 1 … Page 7 Page 8 Page 9 … Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy