#iot-security

[ follow ]
#anomaly-detection
fromHackernoon
10 months ago
Artificial intelligence

Solving the IoT's "Boy Who Cried Wolf" Problem: From Individual Alerts to Cumulative Certainty | HackerNoon

fromHackernoon
10 months ago
Artificial intelligence

Faster, More Accurate IoT Security: A Quantitative Analysis of the CUMAD Framework | HackerNoon

fromHackernoon
10 months ago
Artificial intelligence

Solving the IoT's "Boy Who Cried Wolf" Problem: From Individual Alerts to Cumulative Certainty | HackerNoon

fromHackernoon
10 months ago
Artificial intelligence

Faster, More Accurate IoT Security: A Quantitative Analysis of the CUMAD Framework | HackerNoon

#cybersecurity
Information security
fromITPro
3 months ago

94% of Wi-Fi networks are vulnerable to deauthentication attacks

94% of Wi-Fi networks are vulnerable to deauthentication attacks, highlighting security flaws in critical infrastructure.
Information security
fromITPro
3 months ago

Millions of RSA encryption keys could be vulnerable to attack

A significant percentage of RSA encryption keys are vulnerable due to poor random number generation, especially affecting IoT devices.
Node JS
fromThe Hacker News
1 month ago

New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto

A new Go-based botnet, PumaBot, targets IoT devices with brute-force SSH attacks to expand and deliver malware.
Information security
fromITPro
3 months ago

94% of Wi-Fi networks are vulnerable to deauthentication attacks

94% of Wi-Fi networks are vulnerable to deauthentication attacks, highlighting security flaws in critical infrastructure.
Information security
fromITPro
3 months ago

Millions of RSA encryption keys could be vulnerable to attack

A significant percentage of RSA encryption keys are vulnerable due to poor random number generation, especially affecting IoT devices.
Node JS
fromThe Hacker News
1 month ago

New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto

A new Go-based botnet, PumaBot, targets IoT devices with brute-force SSH attacks to expand and deliver malware.
Tech industry
fromHackernoon
3 months ago

IDT Corporation Partners With AccuKnox For Zero Trust Runtime IoT/Edge Security | HackerNoon

IDT Corporation partners with AccuKnox to implement runtime security CNAPP for improved IoT security amidst increasing AI-related vulnerabilities.
Women in technology
fromWIRED
4 months ago

A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

Edera is developing innovative technology for secure cloud workload isolation to counteract vulnerabilities in shared cloud systems.
[ Load more ]