MITRE will award $50,000 for a solution that detects rogue IoT Devices
http://securityaffairs.co/wordpress/52115/iot/mitre-iot-devices.html →
http://securityaffairs.co/wordpress/52115/iot/mitre-iot-devices.html →
How to hack a security CCTV camera (video) article at http://www.techworm.net/2016/10/hack-security-cctv-camera-video.html talks on issue on IoT device hacking. This video shows how bad IoT CCTV camera security really is. It also tells about Android security. Security cameras are a fine value addition to the security apparatus because they offer irrefutable proof of people in the →
http://electronicsforu.com/technology-trends/industrial-iot-iiot-will-require-embedded-hardware-security?utm_source=eotpage&utm_medium=eotpage&utm_campaign=eotpage&utm_content=eotposts Hardware security is needed in IIoT according to Maxim. →
https://www.washingtonpost.com/world/national-security/us-government-officially-accuses-russia-of-hacking-campaign-to-influence-elections/2016/10/07/4e0b9654-8cbf-11e6-875e-2c1bfe943b66_story.html Cyber security and politics meets in this election. →
http://arstechnica.co.uk/business/2016/10/future-of-the-internet-iptv-ddos-iot-security-issues/ Rogue insecure IoT devices can become a huge issue in the future of Internet. →
http://www.tripwire.com/state-of-security/featured/cybersecurity-is-just-too-much-trouble-for-the-general-public-claims-study/ →
Mozilla Reduces Threat of Export-Grade Crypto to Firefox article tells that Logjam was one of several downgrade attacks discovered in the last 18 months that could theoretically allow a resourced attacker to take advantage of lingering export-grade cryptography to read and modify data over a supposedly secure connection. Other related recent crypto problems are recent OpenSSL →
https://www.hackread.com/linux-mirai-trojan-a-ddos-nightmare/ →
https://www.linkedin.com/pulse/types-cyber-attack-threats-deepak-kumar-d3pak-?trk=hp-feed-article-title-like This article has definitions of different cyber attack types. And there are many of them… →
http://sciencebulletin.org/archives/5445.html?utm_content=buffer1794f&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer Sounds like scifi, but is real, and can have applications in secure communications. →