IoT Security

Discover IoT Security News

Canonical launches Ubuntu Pro for IoT Devices

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Canonical has launched Ubuntu Pro for Devices, a comprehensive offering emphasizing security and compliance for IoT device deployments. This initiative aims to provide 10 years of security maintenance for Ubuntu and thousands of open-source packages, along with device management capabilities through Landscape, a systems management tool by Canonical. Ubuntu Pro also ensures that IoT devices receive reliable security patches from a trusted source.

The Rise of Linux in Edge Computing and IoT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The rise of Linux in edge computing and IoT brings both promise and peril. Linux dominates the IoT and edge computing landscape. Its flexibility and open-source nature make it the top choice for adopters. However, with such widespread usage comes heightened risk.

Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux, IoT Machines

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Threat actors are using blockchain technology to hide the presence of malware on Linux IoT devices. The Nkabuse malware uses a new method of hiding itself from detection: it stores its code in the Bitcoin blockchain. Every time an infected device communicates with the Bitcoin network, it sends a portion of its code with each transaction. This method allows Nkabuse to stay hidden even if it is discovered by a security researcher or neutralized by a patch.

Rust-Based Botnet P2Pinfect Targets MIPS Architecture

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Rust botnet, first discovered in January 2019, is a new type of malware that targets the MIPS processor architecture. The malware works by injecting malicious code into other programs running on vulnerable systems, and it can spread itself across networks using peer-to-peer (P2P) networks.

Accessing IoT Devices Securely: A Guide to Raspberry Pi Remote Access

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the rapidly evolving world of managing Internet of Things (IoT) devices, ensuring secure remote access to ssh iot devices behind firewalls and NAT routers is of utmost importance. This article explores remote IoT device management, focusing on the secure ways to access Raspberry Pi web devices remotely. We will delve into two key methods - SSH (Secure Shell) and web-based access, highlighting the benefits they offer in overcoming firewall and network address translation challenges.

New Cryptocurrency Mining Campaign Targets Linux Systems and IoT Devices

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Internet-facing Linux systems and Internet of Things (IoT) devices are being targeted as part of a new campaign designed to illicitly mine cryptocurrency. "The threat actors behind the attack use a backdoor that deploys a wide array of tools and components such as rootkits and an IRC bot to steal device resources for mining operations," Microsoft threat intelligence researcher Rotem Sde-Or said.

Zymbit Secure Module Features Raspberry Pi CM4

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The new Secure Compute Module (SCM) Pro is an embedded platform built around the Raspberry Pi CM4 for IoT and edge applications requiring security features such as Verified Boot, Hardware Root of Trust, File System Encryption, Physical Tamper Sensors, etc.

Establishing a Root of Trust in Embedded Linux and IoT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With IoT, 5G and embedded devices becoming a larger part of everyone’s daily lives, security—and more importantly, trust in our technology—is on everyone’s minds. Embedded devices don’t have a good security track record; the last several years saw a significant number of high-profile hacks that could prevent people from widely accepting IoT into their homes.