Voicemod

Voicemod

Real-time voice changer that works with any application and comes equipped with an extensive collection of voices and ambient effects

FULL VERSION + CRACK
Flvto Youtube Downloader

Flvto Youtube Downloader

With this simple and intuitive application, you can swiftly download all your favorite online videos to your computer, in just a couple of moves

FULL VERSION + CRACK
iMyFone LockWiper

iMyFone LockWiper

Helps you bypass the iPhone passcode in case you forgot it and the device became unusable or you have to wait for a long time before attempting to unlock it again

FULL VERSION + CRACK
Logic Pro X

Logic Pro X

A fully-featured recoding studio that provides a complete set of tools for musicians who need to write, record, edit and mix music

FULL VERSION + CRACK
Internet Download Manager (IDM)

Internet Download Manager (IDM)

Push your Internet connection to the limits and cleverly organize or synchronize download processes with this powerful application

FULL VERSION + CRACK

IT News

Sep 23
Under regulatory pressure, a large number of pharmaceutical manufacturers, shippers and wholesalers are adopting blockchain to track and trace prescription drugs.
Sep 23
Autonomous Linux, digital assistants, and closer work with Microsoft, VMware and others were among the highlights from this year's conference.
Sep 23
The senator believes Chinese companies will be required to aid surveillance of the US, especially as 5G networks roll out.
Sep 20
Decommissioning a data center is lot more complicated than shutting down servers and switches. Here's what you should keep in mind.
Sep 20
The world's fourth-largest bank said cryptocurrency will allow near real-time money movement and cut out settlement middlemen, thus reducing costs from fees.
Sep 20
Researchers gained access to a Smominru command-and-control server to get details on compromised devices and scope of the attack.
Sep 19
Researchers were able to achieve amplification rates of up to 15,300%. Some mitigations are possible.

Categories

Study: Most enterprise IoT transactions are unencrypted

Of the millions of enterprise-IoT transactions examined in a recent study, the vast majority were sent without benefit of encryption, leaving the data vulnerable to theft and tampering.

The research by cloud-based security provider Zscaler found that about 91.5 percent of transactions by internet of things devices took place over plaintext, while 8.5 percent were encrypted with SSL. That means if attackers could intercept the unencrypted traffic, they'd be able to read it and possibly alter it, then deliver it as if it had not been changed.

Researchers looked through one month's worth of enterprise traffic traversing Zscaler's cloud seeking the digital footprints of IoT devices. It found and analyzed 56 million IoT-device transactions over that time, and identified the type of devices, protocols they used, the servers they communicated with, how often communication went in and out and general IoT traffic patterns.

The team tried to find out which devices generate the most traffic and the threats they face. It discovered that 1,015 organizations had at least one IoT device. The most common devices were set-top boxes (52 percent), then smart TVs (17 percent), wearables (8 percent), data-collection terminals (8 percent), printers (7 percent), IP cameras and phones (5 percent) and medical devices (1 percent).

While they represented only 8 percent of the devices, data-collection terminals generated 80 percent of the traffic.

The breakdown is that 18 percent of the IoT devices use SSL to communicate all the time, and of the remaining 82 percent, half used it part of the time and half never used it.The study also found cases of plaintext HTTP being used to authenticate devices and to update software and firmware, as well as use of outdated crypto libraries and weak default credentials.

While IoT devices are common in enterprises, "many of the devices are employee owned, and this is just one of the reasons they are a security concern," the report says. Without strict policies and enforcement, these devices represent potential vulnerabilities.

Another reason employee-owned IoT devices are a concern is that many businesses don't consider them a threat because no data is stored on them. But if the data they gather is transmitted insecurely, it is at risk.

5 tips to protect enterprise IoT

Zscaler recommends these security precautions:

This story, "Study: Most enterprise IoT transactions are unencrypted" was originally published by Network World.