Anker admits Eufy cams weren’t encrypted

Anker has finally acknowledged that its Eufy smart cameras weren’t end-to-end encrypted.

In November, security researcher Paul Moore highlighted that Eufy cameras were uploading data even when cloud upload settings were disabled. However, an even more concerning finding was that camera streams could be watched live through external video players.

Anker promoted local storage and end-to-end encryption as core features of its security cameras. Several publications have...

Arlo criticised for new end-of-life policy

Netgear spinoff Arlo has been criticised for pulling support for several of its connected security cameras over a relatively short period.

In a new EOL policy, Arlo announced that it may end support for any camera that hasn’t been manufactured for four years old.

Arlo manufactures popular security cameras. Purchasers typically buy a security camera, set it up, and forget about it until it breaks. Every tech product reaches end-of-life (EOL) eventually but you expect...

Swatters used Ring cams to stream victims and taunt police

ring doorbell cyber security cybersecurity iot internet of things infosec

Prosecutors have charged two men with conducting “swatting” attacks that used Ring cameras to livestream the response and taunt police.

Swatters make a false report to law enforcement that prompts an armed response to an address. While often intended to be a sick form of entertainment, they pull resources from where they could actually be needed and — in several cases — have proven to be fatal.

Kya Christian Nelson and James Thomas Andrew McCarty compromised 12...

UK, Canada, and Singapore join forces to secure IoT devices

The UK, Canada, and Singapore are joining forces to improve the security of IoT devices.

In a joint statement, the governments of the respective countries noted the economic and social benefits of IoT devices. However, they also warned of the risks of insecure IoT devices not just to consumers’ own security, privacy, and safety, but also to the broader economy through large-scale cyberattacks.

Many record-breaking cyberattacks have taken advantage of the often poor...

Japanese firms team up to protect connected cars

NTT Communications and DENSO are joining forces to respond “to the threat of increasingly sophisticated cyber-attacks against vehicles.”

The companies are developing the Security Operation Center for Vehicles (VSOC).

Hackers target connected cars for numerous reasons, including location tracking, data gathering, and causing physical harm.

NTT brings to the partnership its vast knowledge and solutions in fields such as networking and cloud computing....

Why IoT Patching Race is a Lose-Lose Game

By Dave Stuart, Sternum

Continual patching is an age-old approach and a persistent problem for smart device manufacturers and users alike — but that’s about to change. Exploit prevention will revolutionize how we secure IoT.

The IoT cybersecurity problem is vast

There are over 29 billion connected IoT devices, sensors, and actuators currently installed across the globe. That’s a large attack surface ripe for exploitation. It is estimated that more than...

Natali Tshuva, Sternum: On ‘future-proof’ IoT security

Sternum is using patented technology to protect IoT devices against even unknown vulnerabilities in real-time.

The company was co-founded by Natali Tshuva, who was recognised for her talents from an early age and was handpicked at 19 to serve in the Israeli Defense Forces’ 8200 unit (the equivalent of the MI6 in the UK or the NSA in the US.) She then went on to hold numerous high-level cybersecurity roles before founding Sternum.

IoT News caught up with Natali to...

Verizon: IoT/mobile cyberattacks leading to downtime increase 22%

Verizon’s latest Mobile Security Index (MSI) highlights continuing growth in IoT/mobile cyberattacks leading to downtime.

According to the research, cyberattacks in the last year involving a mobile/IoT device – that resulted in data or system downtime – increased 22 percent year-on-year.

23 percent of surveyed enterprises had suffered a compromise. Of those, 74 percent said the impact was “major” and over a third (34%) said that it had lasting...

Sternum debuts IoT attack simulation platform

IoT cybersecurity specialists Sternum have released the first real-world attack simulation and evaluation platform.

Last year, a report by Fortune Business Insights found that 67 percent of enterprises have experienced an IoT security incident.

Furthermore, 84 percent of security professionals believe IoT devices are more vulnerable than computers—a concerning statistic given that 69 percent of enterprises have more IoT devices on their networks than...

What cloud-based IoT software means for the future of security

Security Camera

72% of information security leaders state that cloud computing represents a top priority in digital transformation. Cloud-based IoT software is changing the nature of both digital and physical security, allowing both security elements to be merged and used to leverage data better.

So, what does cloud-based IoT software mean for the future of security? Keep reading to learn about the ways cloud-based software is helping to improve efficiency and convenience in the security sphere....