Home Initiatives Security

Security

As the internet flourishes with innovative new mobile apps, cloud services and the internet of things, the threats from hactivists, fraudulent businesses, organized crime and State-Sponsored actors underscores the importance of taking a holistic "Security by Design" for every product, service and business operation .  OTA works through the standards community and public and private sectors to advance best practices including data governance, site security, breach response planning and threat intelligence sharing.  Key areas of focus include the integrity of online advertising and content publishing, supply chain management, cloud services and critical infrastructure.

Dec 15, 2018
SC Media

We hear horror stories about users clicking on some malware-enabled payload and suddenly all of the codes for their hardware security fobs are stolen or a business email compromise (CEO fraud) attack has been launched. Unfortunately, these stories are true. Phishing and its cousins—spear phishing, vishing, smishing, pharming, and whaling—are all serious security concerns, but are they cyber-Armageddon? This special report focuses on the realities of phishing and recommends defenses you can use to reduce your risk and make it a less profitable business for the attackers.

Oct 5, 2018

California governor Jerry Brown signed the “Security of Connected Devices” bill (SB-327) into law, which requires anyone manufacturing an Internet-connected device to set unique passwords or force users to change the password before they can use it.

Sep 19, 2018
IoT World Today

When sorting through surveys related to the subject of IoT security, Jeff Wilbur, technical director of the Internet Society’s Online Trust Alliance (OTA) says he sees results all over the map. “I try to follow as many those surveys as I can.

Sep 17, 2018
the security ledger
Get (IoT) Smart

In this week’s episode (#112): top bug hunters can earn more than $1 million a year from “bounties” paid for information on exploitable software holes in common platforms and applications. What does it take to be among the best? We talk with Jason Haddix of the firm Bug Crowd to find out.

Sep 5, 2018
CSO

Cybercrime damage is projected to reach $6 trillion annually by 2021. That’s creating lots of demand for security protection—estimated at over $1 trillion cumulatively between 2017 and 2021.

Sep 4, 2018
Forbes

It’s common for companies to believe they’re safe from cyberattacks, but it isn’t always true.

Jul 24, 2018
CNET

HTTP, one of the technologies that's made the World Wide Web work since Tim Berners-Lee invented the web more than 25 years ago, just got a big black mark by its name, thanks to Google's Chrome web browser. Google, Mozilla and other tech industry allies have been pushing websites everywhere to switch to the secure version, called HTTPS.

May 11, 2018
Stacey on IoT

Was your Nest password stolen? Apparently the smart home company is notifying users that their Nest password may be vulnerable after it detected that a password breach from another site was affecting users of its site. Since Nest is in the home security business now, this makes tremendous sense. I don’t want someone hacking my cameras, my alarm system, or my Nest door lock.

May 10, 2018
Computing

Smarthome vendor did the right thing says the Internet Society. Nest, the Google-owned manufacturer of home automation devices best known for its smart thermostat, has warned a customer of a password breach, urging him to change it and deploy two-factor authentication (2FA).

Pages

Subscribe to Security