IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
      • AUTONOMOUS
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
      • AUTONOMOUS
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | February 18, 2019

The Cybersecurity Shift: The Best Defense Is a Good Offense

Channel Futures – The U.S. federal government depends on the private sector to help protect critical infrastructure. That’s no small feat for utilities and companies to accomplish, given the increasing frequency, intensity and variations of attacks from nation states and bad actors. With frustrations running high, the idea of retaliating or attacking pre-emptively inevitably comes to mind. But the idea was tabled in the past due to several restrictive circumstances ranging from legal liabilities to technical difficulties. Now the battlefront is changing again, and so is the technology in the arsenal, reigniting dreams of shifting security from defense to offense.

ARTICLE |

Software Alone Can’t Fix Spectre-Class Flaws

Decipher – Over the past year, chip makers, operating system vendors, and browser makers have released multiple software updates addressing the two broad classes of flaws—Meltdown and Spectre—which attackers can abuse to access protected areas of a processor’s memory. It is becoming more apparent that side channel attacks affect all microprocessors with the speculative execution feature (which is most of them!), making them more widespread than was originally believed.

ARTICLE | February 12, 2019

Xiaomi electric scooter reportedly vulnerable to hijacking hack

CNET – A flaw in a popular electric scooter has added to the list of safety concerns surrounding the devices, which have invaded several US cities in the past year. The Xiaomi M365 is an electric scooter used by some scooter rental companies that contains a flaw that could allow a hacker to take full remote control over the vehicle, including causing the scooter to suddenly accelerate or brake, according to information released Tuesday by security research group Zimperium.

ARTICLE | February 5, 2019

Kids’ Smart Watch Recalled Over Security Concerns

Infosecurity – The European Commission is trying to recall a German-made children’s smart watch model over security concerns that hackers could communicate with or monitor the wearer. It issued a recall notice under the Rapid Alert System for Non-Food Products (RAPEX), claiming the risk level is “serious.” It says that the Safe-KID-One device produced by Hamburg-based Enox Group does not comply with the Radio Equipment Directive and all models should be recalled from end users.

ARTICLE |

Child-tracking smartwatch recall shows why IoT security shouldn’t be an afterthought

Verdict – The EU has recalled a smartwatch over concerns that a security flaw could let a malicious user locate children wearing the watch, highlighting the danger of manufacturers rushing internet-connected devices to market without paying due diligence to IoT security.

ARTICLE | January 31, 2019

The rise of DevSecOps

ComputerWeekly – The increasing complexity of security threats facing enterprises is leading to DevSecOps approaches, which combine operations and development with security, so that all business units are involved in security operations.

ARTICLE | January 17, 2019

How more women on cybersecurity teams can create advantages

Fifth Domain – Renee Beckloff never envisioned that the first part of her cybersecurity career would include an expectation to trace electrical wires while in a skirt. Yet, it was common for her bosses to require her to wear skirts while out of the office, even if it meant bending down awkwardly on a raised floor to seek out wire sources.

ARTICLE | January 16, 2019

Cybersecurity Professionals Weigh In On What to Expect in 2019

TechSpective – 2019 is underway. Two weeks down, fifty to go. Technology continues to evolve rapidly and the threat landscape is constantly shifting. It’s challenging for organizations to try and stay a step ahead of cybercriminals and break out of the cycle of just reacting to the exploit du jour. Cybersecurity experts from IOActive are here to help, though, with insight on what to expect in the year ahead.

ARTICLE |

Cybersecurity Professionals Weigh In On What to Expect in 2019

techspective – 2019 is underway. Two weeks down, fifty to go. Technology continues to evolve rapidly and the threat landscape is constantly shifting. It’s challenging for organizations to try and stay a step ahead of cybercriminals and break out of the cycle of just reacting to the exploit du jour. Cybersecurity experts from IOActive are here to help, though, with insight on what to expect in the year ahead.

ARTICLE | December 28, 2018

The Coolest Hacks of 2018

Dark Reading – In-flight airplanes, social engineers, and robotic vacuums were among the targets of resourceful white-hat hackers this year.

It was a year where malicious hackers waged shockingly bold – and, in some cases, previously unimaginable – false flag attacks, crypto-jacking, social engineering, and destructive malware campaigns.

Posts pagination

Previous page Page 1 … Page 21 Page 22 Page 23 … Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy