One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8375601
Date de publication 2023-08-28 10:00:00 (vue: 2023-08-28 10:06:31)
Titre Initiative de cybersécurité IoT de Biden
Biden\\'s IoT Cybersecurity initiative
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The Biden Administration has recently announced the implementation of a cybersecurity labeling program for smart devices. Overseen by the Federal Communication Commission (FCC), this new program seeks to address the security of Internet of Things (IoT) devices nationwide. This announcement is in response to an increasing number of smart devices that fall victim to hackers and malware (AP News). As IoT devices increase in popularity in homes, offices, and other settings, these labels allow consumers to be aware of their digital safety. The cybersecurity labeling program will mandate manufacturers of smart devices to meet certain cybersecurity standards before releasing their products into the market. Each smart device will be required to have a standardized cybersecurity label. Labels will serve as an indicator of the device’s security level and inform consumers about the device\'s compliance with security standards. Devices that meet the highest level of security will be awarded a "Cyber Trust Mark," indicating their adherence to the most stringent security measures. The program will be able to hold companies accountable for producing secure devices while also giving customers the information they need to make informed decisions while purchasing IoT devices. Examples of IoT devices include smart watches, home assistants, Ring cameras, thermostats, and smart appliances. New technologies such as these have grown increasingly more present in modern life. However, hackers have continued to exploit vulnerabilities in these devices, which compromise user privacy. These devices also allow hackers to gain entry to consumers\' larger networks. In the last quarter of 2022, there was a 98% increase in malware targeting IoT devices. New malware variants also spiked, rising 22% on the year (Tech Monitor). Compared to 2018, 2022 had more than 3 times the amount of IoT malware attacks (Statista). Economically motivated attacks have been on the rise, and a larger number of consumers\' personal devices are being breached through IoT devices on the same network. Hackers then hold users\' devices until they are paid a ransom in cryptocurrency to keep the transaction anonymous. This rise in cybersecurity attacks can be contributed to the fact that it has become easier than ever for hackers to target networks. With Raas (Ransomware as a Service) offerings, hackers don’t need any previous cybersecurity expertise, as they can buy software written by ransomware operators. Because IoT devices are often left
Envoyé Oui
Condensat 2015 2016 2018 2022 able about acceleration accountable across added address adherence administration adopt adoption after aims allow allowing also amount announced announcement anonymous another any appliances are aren’t article assistants at&t attacks author awarded aware because become becoming been before being between biden biden’s big blog board botnet breached brute building buy buying cameras camp can car’s carried cars cause certain certifications commission communication communications companies compared compliance compromise concerns conclusion confidence congress connected consumer consumers content continue continued contributed control corporations could create critics cryptocurrency customers cyber cybersecurity data date decisions default determined development device device’s devices digital does don’t drivers each easier easily economically effect efforts electric encourage endorse enhance ensure entire entry environment evaluations eventually ever evolving example examples expected expertise exploit fact fall fcc federal firmware force foster from gadgets gain giving greater grown guess hack hackable hacked hackers had harm has have highest highly hold home homes hoped however ibm implementation important incentivizing include increase increasing increasingly indicating indicator industry infect infiltrate inform information informed initiative inspectors intercepting interests internet involve iot its itself jeep just keep keeping knowledgeable label labeling labels laboratory lag larger last later lead leaks leave left level life limited log make malware man mandate manufacturers mark market marks measures meet methods middle milestone mirai modern monitor more most motivated multiple name nasa nationwide nature need network networks new news not number offerings offices often ongoing online operators other out outdated over overseen own paid pass password passwords past perimeterwatch periodic personal play popularity positions post potential praised present previous prioritize privacy private procedures producing product products professionals program programs protect provided providing provisions purchasing quarter raas ransom ransomware rapidly rating recently releasing relevant remain repeatedly replicate required response responsibility resulting reviews ring rise rising risks robust role safeguard safety same secure securing security seeks serve service settings shared shown significant small smart software solely solutions some spiked standardized standards statista steering step stringent stronger such sure take takes target targeting team tech technologies technology testing than then thermostats these things threats through times towards transaction transparent trust trustworthy try until update use used user users using variants vetted victim views voiced vulnerabilities watches what when which who will withstand works world would written year
Tags Ransomware Malware Hack Vulnerability
Stories
Notes ★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: