IoT & ICS Security

Hacked Robot Vacuums, Secret Printer Tracking Dots
In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth ...

World Economic Forum: AI, Quantum Require ‘Paradigm Shift’ in Security
The World Economic Forum is advocating a shift in security thinking from secure by design to resilience by design in the face of the rapid development and expanding connectivity of emerging technologies ...

Apple Enrages IT — 45-Day Cert Expiration Fury
CA/B testing: Ludicrous proposal draws ire from “furious” systems administrators ...

Launching a critical infrastructure security program in 4 phases
As per the Cybersecurity and Infrastructure Security Agency (CISA), threat actors were still leveraging brute force intrusions, default credentials, and other unsophisticated attack methods to target internet-exposed operational technology and industrial control ...
More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies
The Washington Post has a long and detailed story about the operation that’s well worth reading (alternate version here). The sales pitch came from a marketing official trusted by Hezbollah with links ...

Simple yet essential cybersecurity strategies for ensuring robust OT security
At the heart of an OT security strategy lies the ability to clearly distinguish IT and OT security. Since both share tech, operational goals, and to some extent an enabling mission, it ...

Kia Security Flaw Exposed, NIST’s New Password Guidelines
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The ...

Biggest Ever DDoS is Threat to OT Critical Infrastructure
Egyptian River Floods: Operational technology (OT) targeted in “world record” 3.8 Tb/s distributed denial of service (DDoS) ...

10 steps for reducing ICS asset risk exposure
The level of asset risks that OT operators are exposed to varies according to industries and the asset security management practices that they have adopted. Assets lie at the heart of almost ...

Kia’s Huge Security Hole: FIXED (Finally)
Connected cars considered crud: Kia promises bug never exploited. But even 10-year-old cars were vulnerable ...