Viakoo Blog

ThroughTek P2P Vulnerability Puts Spotlight on IoT Remediation

This past week a significant vulnerability was found in several different makes and models of IP cameras, enabling hackers to gain control of the audio and video feeds. The ThroughTek P2P vulnerability is based on software code that ThroughTek provides to multiple camera manufacturers for devices that have been sold for many years. In the age of deepfakes and commonly available tools to manipulate images, this vulnerability is a critical one to remediate before it causes significant damage. Yet that is at the heart of IoT cyber hygiene – once a vulnerability is detected, what can you do and how fast can you do it?

Are You Sisyphus or Proteus?

This week I came across two quotes that reinforced why keeping up with firmware patches is both...

Colonial Pipeline Cyberattack – Will This One Spur Action?

The ransomware attack and subsequent shutdown of the Colonial Pipeline system on the U.S. East...

NDAA 889: You Need Automation To Be Successful

If you were informed that certain brands of footwear had unacceptable amounts of radiation coming...

Breaking the Cyber Kill Chain

Many cyber security professionals rely on process and methodology to ensure they are as effective...

What’s Your IoT Security Quadrant?

Knowing where you are positioned is a good starting point to take action to improve that position....

Why Manually Updating IoT Firmware is >10X Harder Than IT Firmware

A recent quote from cyber expert Chris Roberts highlights the immediate threat from unpatched and...

Why Urgency Around Unmanaged and IoT Security Hit This Week

In several corporate boardrooms (perhaps yours), this was the week where the risk and scale of...

Viakoo Comments on Solarwinds Breach

Summary Viakoo was not affected by the SolarWinds breach.  Viakoo does not share technologies nor...

IoT and Security: What CISOs Must Know

Ubiquitous in nature and expansive in scope, IoT is vulnerable on many levels In the ever-expanding...
Prev 1 2 Next