Once you see this vulnerability in action, it’s easy to imagine how easily devices can be exploited. Simple vulnerability hacks and tactics such as this can be used in coordination with home routers, smart speakers, video surveillance equipment, and much more to create havoc.
Internet of Things security is a misnomer. By default, the connected things that have entered our mass market electronics devices have gaping security flaws. Device manufacturers, OEMs, and consortiums are collaborating and building frameworks and specifications for securing IoT devices and endpoints that they connect to. zvelo’s artificial intelligence powered IoT security solutions include agentless device detection, profiling, and behavioral anomaly detection. Our approach is hardware-agnostic and offers the most advanced network and device insight for OEMs and equipment manufacturers.
What’s Reaper? Reaper (a.k.a IotTroop) is the latest botnet threat which is specifically targeting IoT vulnerabilities. With over 1.2 million devices already impacted, Reaper is the the largest IoT bot attack to date and continuing to grow rapidly. Using multiple C2’s, each with 10s of thousands of unique active IPs daily, Reaper is gaining momentum with each new device it exploits.
Network security company zvelo Monday unveiled an IoT security offering that uses artificial intelligence to automate the way enterprises discover and profile IoT devices on the network – and detect ones that are compromised.
The introduction of voice-activated smart home solutions – like Amazon Echo and Dot, Google Home, and Apple’s HomePod
In this week’s Embedded Insiders podcast, Rich Nass and Brandon Lewis welcome Jeff Finn, CEO of data categorization and security firm zvelo.
By Eric Watkins, Senior Malicious Detection Researcher at zvelo This week, a new security vulnerability subject to remote attack, known as Devil’s Ivy, is targeting the C++ library used by thousands of different IoT device vendors. The most popular devices being compromised are IoT video cameras; however, the associated risk is not limited to video…
*****The following article, by Jeff Finn, appears as an online article in the Opinion section on InfoSecurity Magazine Home’s web site and was originally published on July 13, 2017. In InfoSecurity Magazine: How IoT Device Discovery and Activity Detection Can Work by Jeff Finn, CEO of zvelo Even as IoT device volume races towards 200 billion by 2020, the…
Petya is a ransomware campaign that has been updated to take advantage of an exploit named EternalBlue (named this by the NSA as part of their toolset). This exploit takes advantage of a vulnerability in the Server Message Block (SMB) protocol.
zvelo is beta testing an IoT Security solution, a software-based sensor that discovers network-attached devices, profiles them and tags compromised units. Think of it as an elaborate, sophisticated hall monitor that knows how you behave, spots and reports abnormalities, takes your thumbprint and then scores you for trustworthiness.
Content categorization vendor zvelo is getting into the internet of things (IoT) space with the debut of the company’s new IoT Security platform.Details