CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
IoT Devices
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

IoT Devices

Communication and internet network connecting IoT devices showing critical security flaws
Cyber SecurityNews

Hundreds of Millions of IoT Devices Affected by TCP/IP Security Flaws Allowing Remote Code Execution and DDoS Attacks

July 13, 2020
Critical TCP/IP security flaw in a widely used software library affects hundreds of millions of IoT devices connected to the internet, including products from HP, Intel and many others.
Read More
Man demonstrating digital lock on IoT devices showing new IoT cybersecurity regulation
Cyber SecurityNews

IoT Cybersecurity Improvement Act of 2019 Passes House of Representatives; Would Demand Cybersecurity Standards for Devices and Contractor Requirements

September 28, 2020
Designed to create more stringent contractor screening and government use requirements, the IoT Cybersecurity Improvement Act of 2019 has now cleared its first hurdle in the House of Representatives.
Read More
Amazon fulfillment center front showing IoT devices issue with factory reset
Data PrivacyNews

Is It Possible To Make IoT Devices Private? Amazon Echo Dot Does Not Wipe Personal Content After Factory Reset

July 15, 2021
IoT devices that record copious details of the daily lives of users raise natural privacy concerns. A history-clearing factory reset on the Echo Dot does not appear to clear that data.
Read More
Household indoor digital surveillance webcam showing supply chain vulnerability in IoT devices
Cyber SecurityNews

Supply Chain Vulnerability in Cloud Connectivity Platform Threatens 83 Million IoT Devices

August 24, 2021
Supply chain vulnerability in the ThroughTek "Kalay" network, a cloud-based communications platform used by an estimated 83 million IoT devices, could allow for remote compromise and control.
Read More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results