Quantcast
Channel: Symantec Connect Community - Internet of Things
Browsing all 40 articles
Browse latest View live

The Internet of Things: Opportunity, Threat and Inevitability

The Internet of Things (IoT) took another step forward, as standardisation body OASIS formed a committee to enable the adoption of Messaging Queue Telemetry Transport (MQTT) for machine to machine...

View Article



Image may be NSFW.
Clik here to view.

Self-Assembling Robots May Herald Dawn of Evil Toasters

read more

View Article

Linux Worm Targeting Hidden Devices

Symantec has discovered a new Linux worm that appears to be engineered to target the “Internet of things”. The worm is capable of attacking a range of small, Internet-enabled devices in addition to...

View Article

Securing the Internet of Things - where's the risk?

Based on discussions we are having across our customer base, we know that the Internet of Things (IoT) is a growing phenomenon. It’s not particularly new - after all, organisations have been monitoring...

View Article

IoT and the problem of identity

Identity management was never easy. The basic need for identity is that of ‘non-repudiation’ - assurance that a person is who they say they are - as used to authenticate and authorise individuals to...

View Article


Internet of Things &“The Wrong Side of Creepy”


Having conducted my entire career in the world of information technology, I (like the majority of my peers) am very used to and inspired by questions that begin with “could we..?”. The technology arena...

View Article

Image may be NSFW.
Clik here to view.

The Internet of Things: New Threats Emerge in a Connected World

read more

View Article

The Internet of Things: New Threats Emerge in a Connected World

This Blog was originally posted in Security Response.read more

View Article


Despite the News, Your Refrigerator is Not Yet Sending Spam

You may have seen media reports based on research by Proofpoint that hundreds of home devices such as entertainment systems and even a refrigerator had been sending spam. We refer to this collection of...

View Article


IoT Security and the law of unintended consequences

It’s still early days for the Internet of Things (IoT). While some are suggesting a complete revolution in 'smart' physical objects which will change our lives, I don’t think anyone will notice that...

View Article

Image may be NSFW.
Clik here to view.

IoT Worm Used to Mine Cryptocurrency

read more

View Article

Internet of Things - What will we fail to anticipate?

I believe that the IT industry will, in the future, hold far more responsibility for radical changes to culture and society than ever before. The Internet of Things (IoT) will see humanity take a new...

View Article

Exposed and vulnerable in a post-XP support world

Microsoft’s decision to switch off all support for Windows XP, some dozen years after it first made its entrance, is a momentous one. Those who have doggedly stuck by this much loved operating system,...

View Article


Image may be NSFW.
Clik here to view.

The 2013 Internet Security Threat Report: Year of the Mega Data Breach

read more

View Article

Internet Security Threat Report 2013 - The Year of the Identity Breach?

In security as in business, information is power. As we put together the latest edition of the Internet Security Threat Report, we wanted to do more than simply throw some figures out there.read more

View Article


Image may be NSFW.
Clik here to view.

Highlights from the SyScan 2014 Conference

read more

View Article

IoT in the Enterprise

All too often, technology is subject to the law of unintended consequences - a great, positive example is SMS, which was originally planned as a tool for maintenance alerts. Less positive is the...

View Article


Image may be NSFW.
Clik here to view.

Looking at Android L – The Next Level

Summary: Google wants Android everywhere and on everything but what does this mean for user security? read more

View Article

Symantec Innovates Toward The Future of IoT

Summary: Having all of our useful belongings connected to the Internet could have great potential to make our lives easier; however, it also leaves us more vulnerable to security issues. Here's how...

View Article

Image may be NSFW.
Clik here to view.

How safe is your quantified self? Tracking, monitoring, and wearable tech

Summary: Self-tracking enthusiasts are generating a torrent of personal information through apps and devices. Is this data safe from prying eyes?read more

View Article
Browsing all 40 articles
Browse latest View live


Latest Images