Cloud Security Alliance Maps Out IoT Security Guidelines
http://mobile.eweek.com/networking/cloud-security-alliance-details-iot-security-guidelines.html →
http://mobile.eweek.com/networking/cloud-security-alliance-details-iot-security-guidelines.html →
https://www.wired.com/2016/10/akamai-finds-longtime-security-flaw-2-million-devices/ It’s well known that the Internet of Things is woefully insecure, but the most shameful and frustrating part is that some of the vulnerabilities that are currently being exploited could have been eradicated years ago. Now evidence of how these bugs are being used in attacks is calling attention to security holes that are →
http://arstechnica.com/security/2016/10/breach-exposes-at-least-58-million-accounts-includes-names-jobs-and-more/ →
http://securityaffairs.co/wordpress/52115/iot/mitre-iot-devices.html →
How to hack a security CCTV camera (video) article at http://www.techworm.net/2016/10/hack-security-cctv-camera-video.html talks on issue on IoT device hacking. This video shows how bad IoT CCTV camera security really is. It also tells about Android security. Security cameras are a fine value addition to the security apparatus because they offer irrefutable proof of people in the →
http://electronicsforu.com/technology-trends/industrial-iot-iiot-will-require-embedded-hardware-security?utm_source=eotpage&utm_medium=eotpage&utm_campaign=eotpage&utm_content=eotposts Hardware security is needed in IIoT according to Maxim. →
https://www.washingtonpost.com/world/national-security/us-government-officially-accuses-russia-of-hacking-campaign-to-influence-elections/2016/10/07/4e0b9654-8cbf-11e6-875e-2c1bfe943b66_story.html Cyber security and politics meets in this election. →
http://arstechnica.co.uk/business/2016/10/future-of-the-internet-iptv-ddos-iot-security-issues/ Rogue insecure IoT devices can become a huge issue in the future of Internet. →
http://www.tripwire.com/state-of-security/featured/cybersecurity-is-just-too-much-trouble-for-the-general-public-claims-study/ →
Mozilla Reduces Threat of Export-Grade Crypto to Firefox article tells that Logjam was one of several downgrade attacks discovered in the last 18 months that could theoretically allow a resourced attacker to take advantage of lingering export-grade cryptography to read and modify data over a supposedly secure connection. Other related recent crypto problems are recent OpenSSL →