Lock and Code S1Ep10: Pulling apart the Internet of Things with JP Taggart

This week on Lock and Code, we talk to JP Taggart, senior security researcher at Malwarebytes, about the Internet of Things.

Categories:

Tags:

(Read more…)

The post Lock and Code S1Ep10: Pulling apart the Internet of Things with JP Taggart appeared first on Malwarebytes Labs.

End of line: supporting IoT in the home

Warranties which may not warranty, certificates which might fail to certify, lifespans which don’t match the length of cover promised. This could be IoT.

Categories:

Tags:

(Read more…)

The post End of line: supporting IoT in the home appeared first on Malwarebytes Labs.

Cybersecurity labeling scheme introduced to help users choose safe IoT devices

Several countries are introducing a cybersecurity labeling scheme to inform consumers about the security features of IoT devices and force manufacturers to improve these features.

Categories:

Tags:

(Read more…)

The post Cybersecurity labeling scheme introduced to help users choose safe IoT devices appeared first on Malwarebytes Labs.

Explained: the strengths and weaknesses of the Zero Trust model

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Categories:

Tags:

(Read more…)

The post Explained: the strengths and weaknesses of the Zero Trust model appeared first on Malwarebytes Labs.

The little-known ways mobile device sensors can be exploited by cybercriminals

Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.

Categories:

Tags:

(Read more…)

The post The little-known ways mobile device sensors can be exploited by cybercriminals appeared first on Malwarebytes Labs.

A week in security (November 18 – 24)

A roundup of cybersecurity news from November 18 – 24, including Coalition against stalkerware, exploit kits, ransomware, data leaks, and juice jacking.

Categories:

Tags:

(Read more…)

The post A week in security (November 18 – 24) appeared first on Malwarebytes Labs.

IoT bills and guidelines: a global response

IoT laws and guidelines abound, as we take a look what’s happening around the world in the name of securing Internet-connected devices.

Categories:

Tags:

(Read more…)

The post IoT bills and guidelines: a global response appeared first on Malwarebytes Labs.

Vital infrastructure: securing our food and agriculture

Food and agriculture is one of the biggest verticals and one that reaches almost everyone of us. So why do we never hear about cybersecurity in this sector? We need to talk!

Categories:

Tags:

(Read more…)

The post Vital infrastructure: securing our food and agriculture appeared first on Malwarebytes Labs.

15,000 webcams vulnerable to attack: how to protect against webcam hacking

We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.

Categories:

Tags:

(Read more…)

The post 15,000 webcams vulnerable to attack: how to protect against webcam hacking appeared first on Malwarebytes Labs.

Facial recognition technology: force for good or privacy threat?

It seems facial recognition technology, as technology so often does, has raced far ahead of our ability to define its ethical use. We take a hard look at major concerns brewing in cities around the world.

Categories:

Tags:

(Read more…)

The post Facial recognition technology: force for good or privacy threat? appeared first on Malwarebytes Labs.