Unregulated IoT Devices Now Entry Point for Elaborate Hacks

The Internet of Things is more vulnerable than previously proven. Up until now the most common attack via IoT device has been to enlist thousands of them into botnets. Another method of attack is to find entry via a weak IoT device to conduct a ransomware attack. Now, IoT security firm Senrio has demonstrated that attackers can jump from one IoT device to another, without moving through PCs and servers, making their path even harder to discover. In other words, one vulnerable IoT device can create network disruption. Continue reading Unregulated IoT Devices Now Entry Point for Elaborate Hacks

China Campaigns Against Western Media and Tech Firms

As the result of a two-pronged campaign coming out of China against Western media and the technology companies that create devices from which the Chinese access news and entertainment, it may become increasingly difficult for outside companies to operate within the country. As part of the ongoing campaign, Chinese state-fun broadcaster CCTV aired a critical documentary last week regarding Apple’s customer service. Continue reading China Campaigns Against Western Media and Tech Firms