IOT News Wednesday, March 7 Complete smm platform, Priceless time, Cyber arms race & more…

IOT News TLDR / Table of Contents

    Tags: Complete SMM platform, priceless time, deeper interactions, strong community, Sort your community

    • Research has revealed that cyber-attacks are the number one threat businesses will be faced with in 2018, as the number of malware variants increases.
    • SonicWall has revealed its Cyber Threat Report, which recorded an 18.4% year on year increase in the number of malware attacks last year taking the total to 9.32bn.
    • The research did however demonstrate ransomware attacks have reduced over the last two years, down to 184m from 645m, but the number of new Common Vulnerabilities and Exposures (CVEs) totalled 14,500 increasing by 101.2%.
    • This suggests cybercriminals are finding new ways to target businesses, as common attacks become more well-known and preventable.
    • In 2017 the number of unique malware samples were 51.4% higher than 2014, demonstrating new malware cocktails had been developed to target individuals.

    Tags: cyber arms race, new malware, new malware variant, malware variants increases, malware attacks

    • According to a report by Trustwavereleased last week, 61 percent of companies surveyed who have deployed some level of connected technology have also had to deal with a security incident that they can trace back to an IoT device.
    • Despite calls for greater IoT security, 24 percent of respondents said they have dealt with malware infiltration through an IoT device.
    • Most organizations are 10 to 20 years behind in their security practices when it comes to IoT, and theyre repeating the same security mistakes as they have in the past, including storing their credentials in plain text, Michel Chamberland, practice lead for Trustwave SpiderLabs, told Threatpost.
    • And in October, security firms Check Point andNewSky Securitywarnedhackers were swapping scripts on forums to scan the internet for vulnerable IoT devices and then dump weak credentials from them, potentially enabling them to eventually launch full-scale DDoS attacks.
    • Chamberland said that businesses can take several steps to mitigate IoT-related threats including adopting a patching policy to make sure that IoT devices are addressed in that procedure.

    Tags: IoT devices, vulnerable IoT devices, greater IoT security, IoT Cybersecurity Readiness, IoT boom

    Top IOT Courses

    Internet of Things (IoT) Automation using Raspberry Pi 2 (1,358 students enrolled)

    By Venkatesh Varadachari
    • Read the raw temperature of the multiple sensors using Linux command.
    • Program the sensors to display the updated temperature after a delay of every 10 seconds.
    • Receive an automated email alert when the temperature crosses a certain limit.
    • Connect the sensors to an open source cloud and access the temperature in a web dashboard from anywhere.
    • Retrieve the complete month statistics by visiting the web portal.

    Learn more.

    Start the Internet of Things (IoT) from scratch (96 students enrolled)

    By Dr. Kobkiat Saraubon
    • Build your own IoT projects using NodeMCU based on Arduino platform
    • Write programs to control your hardware
    • Connect your IoTs to cloud services to store/process/share some data

    Learn more.

    Comments are closed, but trackbacks and pingbacks are open.