Why IoT Patching Race is a Lose-Lose Game

By Dave Stuart, Sternum

Continual patching is an age-old approach and a persistent problem for smart device manufacturers and users alike — but that’s about to change. Exploit prevention will revolutionize how we secure IoT.

The IoT cybersecurity problem is vast

There are over 29 billion connected IoT devices, sensors, and actuators currently installed across the globe. That’s a large attack surface ripe for exploitation. It is estimated that more than...

Natali Tshuva, Sternum: On ‘future-proof’ IoT security

Sternum is using patented technology to protect IoT devices against even unknown vulnerabilities in real-time.

The company was co-founded by Natali Tshuva, who was recognised for her talents from an early age and was handpicked at 19 to serve in the Israeli Defense Forces’ 8200 unit (the equivalent of the MI6 in the UK or the NSA in the US.) She then went on to hold numerous high-level cybersecurity roles before founding Sternum.

IoT News caught up with Natali to...

Verizon: IoT/mobile cyberattacks leading to downtime increase 22%

Verizon’s latest Mobile Security Index (MSI) highlights continuing growth in IoT/mobile cyberattacks leading to downtime.

According to the research, cyberattacks in the last year involving a mobile/IoT device – that resulted in data or system downtime – increased 22 percent year-on-year.

23 percent of surveyed enterprises had suffered a compromise. Of those, 74 percent said the impact was “major” and over a third (34%) said that it had lasting...

Sternum debuts IoT attack simulation platform

IoT cybersecurity specialists Sternum have released the first real-world attack simulation and evaluation platform.

Last year, a report by Fortune Business Insights found that 67 percent of enterprises have experienced an IoT security incident.

Furthermore, 84 percent of security professionals believe IoT devices are more vulnerable than computers—a concerning statistic given that 69 percent of enterprises have more IoT devices on their networks than...

What cloud-based IoT software means for the future of security

Security Camera

72% of information security leaders state that cloud computing represents a top priority in digital transformation. Cloud-based IoT software is changing the nature of both digital and physical security, allowing both security elements to be merged and used to leverage data better.

So, what does cloud-based IoT software mean for the future of security? Keep reading to learn about the ways cloud-based software is helping to improve efficiency and convenience in the security sphere....

Mirai variant ‘Beastmode’ exploits fresh vulnerabilities

A variant of the Mirai botnet called Beastmode has been observed exploiting recently-discovered vulnerabilities.

The Mirai botnet is composed primarily of IoT and embedded devices. In 2016, Mirai made national headlines when it used exploited connected devices to overwhelm several high-profile targets with record-setting Distributed Denial-of-Service (DDoS) attacks.

Mirai’s original creator was arrested in the fall of 2018 but variants have continued to emerge which...

Editorial: 10 predictions for the IoT in 2022

As we begin wrapping up the year, it’s time to predict what the IoT industry will look like in 2022.

Seamlessly connected homes

“The US market has seen substantial year-over-year growth in the number of connected homes, and this is expected to continue in the years to come,” analysts from McKinsey said in a recent report.

“However, we're still far from the vision of seamlessly connected homes.”

The emergence of Thread as a widely-backed...

UK introduces PSTI bill to protect IoT devices

The UK has introduced the Product Security and Telecommunications Infrastructure (PSTI) bill which promises to protect IoT devices.

Many “smart” devices fail to live up to their name when it comes to security. As manufacturers seek to keep pace with the demand for IoT devices, security is too often an afterthought.

Julia Lopez, Minister for Media, Data, and Digital Infrastructure, said:

“Every day hackers attempt to break into people’s smart devices....

Trend Micro and Fujitsu set out to secure connected vehicles

Cybersecurity giant Trend Micro has partnered with Fujitsu on a solution to secure connected vehicles.

The pair are collaborating with “automotive-related” manufacturers to ensure the solution meets their needs.

A V-SOC (Vehicle-Security Operation Center) is the core service at the centre of the solution—featuring an abnormality attack detection engine, vital data collection for incident response, and monitoring analysis notifications.

On the backend,...

Why your phone is the key to better building security

The prevalence of smartphones and apps like Apple Wallet, which stores digital versions of credit cards, boarding passes, and event tickets, make our phones an essential part of everyday life. Now that Apple has opened the Wallet app to developers, experts expect to see an increase in mobile credentials used for everything from unlocking cars to storing driver’s licenses, to accessing the office. In this article, we’ll take a closer look at how mobile credentials impact cyber and...