Do Cyberattacks Affect Stock Prices? It Depends on the Breach
DarkReading – A security researcher explores how data breaches, ransomware attacks, and other types of cybercrime influence stock prices.
Exploiting Embedded Linux Devices Through the JTAG Interface
Techspective – With the explosion of internet-of-things (IoT) and connected, industrial IoT (IIoT), and connected, smart home devices, it is getting harder and harder to find things that don’t have some sort of embedded operating system and connectivity today. If it’s a connected device running an operating system, there is a very good chance that an attacker can find a vulnerability to exploit to compromise the device and gain access to your network. That is true even in a best-case scenario where secure development principles and basic security best practices are…
Exploiting Embedded Linux Devices Through the JTAG Interface
Security Boulevard – With the explosion of internet-of-things (IoT) and connected, industrial IoT (IIoT), and connected, smart home devices, it is getting harder and harder to find things that don’t have some sort of embedded operating system and connectivity today. While connected devices can streamline productivity and provide a variety of benefits, they also expose you to risk.
What Can Your Connected Car Reveal About You?
Dark Reading – App developers must take responsibility for the security of users’ data. The smartphone has become the central command center for many people’s lives. A 2020 study found that the average user has 67 apps on their phone — but most people never stop to think about what data those apps contain or how well protected it is.
How Can Popular Robots Be Hacked?
DailyMail – Security research firm IOActive also conducted a study that found roughly 50 vulnerabilities in robots produced by many popular vendors. Overall, these vulnerabilities lead to a plethora of dangers, including the possibility they could be hijacked and used as secretive listening devices or even weapons.