article thumbnail

Are the Police using Smart-Home IoT Devices to Spy on People?

Schneier on Security

IoT devices are surveillance devices, and manufacturers generally use them to collect data on their customers. Surveillance is still the business model of the Internet, and this data is used against the customers' interests: either by the device manufacturer or by some third-party the manufacturer sells the data to.

IoT 273
article thumbnail

New IoT Security Regulations

Schneier on Security

While the US government is largely absent in this area of consumer protection, the state of California has recently stepped in and started regulating the Internet of Things, or "IoT" devices sold in the state­and the effects will soon be felt worldwide. But it's just one of dozens of awful "security" measures commonly found in IoT devices.

IoT 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets

Security Boulevard

We have come to […] The post The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets appeared first on CISO Global. The post The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets appeared first on Security Boulevard.

article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages. Related: Companies sustain damage from IoT attacks That was back in 1982.

IoT 279
article thumbnail

Verkada Surveillance Hack, Breach Highlights IoT Risks

Security Boulevard

reported a breach of customer surveillance data to the U.S. The post Verkada Surveillance Hack, Breach Highlights IoT Risks appeared first on Security Boulevard. The post Verkada Surveillance Hack, Breach Highlights IoT Risks appeared first on Security Boulevard. Building security vendor Verkada Inc.

article thumbnail

Here’s how anyone with $20 can hire an IoT botnet to blast out a week-long DDoS attack

The Last Watchdog

A nascent cottage industry is starting to gel around DDoS botnets-for-hire , comprised of millions of compromised IoT devices. IoT botnets can be hired to execute smaller-scaled DDoS attacks designed to knock out a networked application, rather than a whole website. IoT force multiplier. But that’s not all.

DDOS 255
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Sundaresan Bindu Sundaresan , Cybersecurity Director, LevelBlue In 2025, cybercriminals will exploit supply chain vulnerabilities, ransomware, IoT botnets, and AI-driven phishing. Rising IoT use demands standards to prevent device weaponization, while AI-enabled phishing challenges defenses.