Connected Cars, Smart Homes Remain Targets
Security Boulevard – The European Union Agency for Cybersecurity (ENISA) released a smart car safety report detailing how connected cars expand the potential of cyberattacks. Several years ago, IOActive researchers (among others) proved that it’s possible to compromise autonomous vehicle systems, which led to millions of recalls.
What is ransomware? Everything you need to know about one of the biggest menaces on the web
ZDNet – There’s even the potential that hackers could infect medical devices, putting lives directly at risk. Researchers at IOActive took this once step further by demonstrating how a commercially available robot could come under a ransomware attack.
Researchers Show How Hackers Can Target ICS via Barcode Scanners
Security Week – Hackers previously demonstrated that keystrokes can be remotely injected via an industrial barcode scanner into the computer the scanner is connected to, which could result in the computer getting compromised. IOActive researchers have also been looking at industrial barcode scanners and part of their research, which they described in a blog post, focuses on the scanners used by airport baggage handling systems.
Securing the future of mobility for a post-pandemic world
Intelligent Transport – CAVs especially present a number of security concerns. The increased technology needed to power the vehicle systems can make them more vulnerable to third-party security threats. The potential of such attacks has hit headlines in recent years. A project led by security researchers at Twitter and IOActive saw vehicles remotely hacked through their entertainment systems to reach dashboard functions, steering, brakes and transmission.
IOActive launches Continuous Penetration Testing services
Industrial Cyber – Cybersecurity services provider IOActive announced today the launch of a Continuous Penetration Testing service (CPT). The new CBT service employs an innovative testing method designed to address the challenge of integrating security testing into an agile development model. As many organizations have moved to Continuous Integration and Continuous Deployment (CI/CD) processes the independent validation and verification processes have not aligned with that enhanced agility until now.