7 Non-Computer Hacks That Should Never Happen
Dark Reading – You might look at an old fax machine or dusty printer and just see out-of-date technology that you can’t even use to send email. You might look at the company mailroom as just a place to collect unsolicited junk mail you’ll soon throw in the trash. Attackers may see something different: vulnerabilities, often ignored by your security department. Cyberrattacks on non-computer vectors are more common than you think.
IOActive Highlights Security Issues and Concerns for Smart Cities
Techspective – There are a variety of potential benefits for cities that embrace technology. “Smart cities” can implement technology to streamline functionality and improve efficiency in a number of ways from detecting when a public parking lot is full to enabling remote wireless control of traffic signals. Of course, connecting the infrastructure of a city and making it remotely accessible and manageable also exposes it to potential risk and malicious activity.
The most interesting Internet-connected vehicle hacks on record
ZDnet – As researchers turn their attention to vehicles, we’ve seen everything from sending drivers into a ditch to brakes which suddenly won’t work.
Industry experts weigh in on UK’s new IoT guidelines
The Daily Swig – The UK government’s new code of practice for Internet of Things (IoT) devices has been widely welcomed as a step towards implementing security by design – though many within the industry say it doesn’t go far enough to protecting consumers or organizations.
New Security Woes for Popular IoT Protocols
Dark Reading – Researchers at Black Hat Europe will detail denial-of-service and other flaws in MQTT, CoAP machine-to-machine communications protocols that imperil industrial and other IoT networks online.