CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
IoT Devices
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

IoT Devices

Household indoor digital surveillance webcam showing supply chain vulnerability in IoT devices
Cyber SecurityNews

Supply Chain Vulnerability in Cloud Connectivity Platform Threatens 83 Million IoT Devices

August 24, 2021
Supply chain vulnerability in the ThroughTek "Kalay" network, a cloud-based communications platform used by an estimated 83 million IoT devices, could allow for remote compromise and control.
Read More
Amazon fulfillment center front showing IoT devices issue with factory reset
Data PrivacyNews

Is It Possible To Make IoT Devices Private? Amazon Echo Dot Does Not Wipe Personal Content After Factory Reset

July 15, 2021
IoT devices that record copious details of the daily lives of users raise natural privacy concerns. A history-clearing factory reset on the Echo Dot does not appear to clear that data.
Read More
Man demonstrating digital lock on IoT devices showing new IoT cybersecurity regulation
Cyber SecurityNews

IoT Cybersecurity Improvement Act of 2019 Passes House of Representatives; Would Demand Cybersecurity Standards for Devices and Contractor Requirements

September 28, 2020
Designed to create more stringent contractor screening and government use requirements, the IoT Cybersecurity Improvement Act of 2019 has now cleared its first hurdle in the House of Representatives.
Read More
Communication and internet network connecting IoT devices showing critical security flaws
Cyber SecurityNews

Hundreds of Millions of IoT Devices Affected by TCP/IP Security Flaws Allowing Remote Code Execution and DDoS Attacks

July 13, 2020
Critical TCP/IP security flaw in a widely used software library affects hundreds of millions of IoT devices connected to the internet, including products from HP, Intel and many others.
Read More

Latest

Man holding mobile phone showing SMS phishing attack

SMS Phishing Attack Compromised Twilio Leaking Customer Data, Targeted Cloudflare

Digital yuan gold coin over yuan banknotes showing PBOC privacy protection for CBDC

Privacy Protection Coming for Digital Yuan? PBOC Promises “Respect” for Personal Information

World map on a technological background showing data privacy laws and cross-border data sharing

Navigating Evolving Data Privacy Laws and Cross-Border Data Sharing

Boy using phone in bed at night showing cyber safety and end-to-end encryption

UK Government Wrestles With Balance Between Child Cyber Safety and Legitimate End-to-End Encryption Purposes as Agencies Endorse Client-Side Scanning

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results