Canonical has launched Ubuntu Pro for Devices, a comprehensive offering emphasizing security and compliance for IoT device deployments. This initiative aims to provide 10 years of security maintenance for Ubuntu and thousands of open-source packages,...
In the rapidly evolving world of managing Internet of Things (IoT) devices, ensuring secure remote access to ssh iot devices behind firewalls and NAT routers is of utmost importance. This article explores remote IoT device management, focusing on the secure ways to access Raspberry Pi web devices remotely. We will delve into two key methods - SSH (Secure Shell) and web-based access, highlighting the benefits they offer in overcoming firewall and network address translation challenges.
Internet-facing Linux systems and Internet of Things (IoT) devices are being targeted as part of a new campaign designed to illicitly mine cryptocurrency. "The threat actors behind the attack use a backdoor that deploys a wide array of tools and components such as rootkits and an IRC bot to steal device resources for mining operations," Microsoft threat intelligence researcher Rotem Sde-Or said.
IoT cybersecurity company Sternum has identified a security vulnerability affecting Zyxel Networks’ Linux-operated NAS drives, including NAS326, NAS540, and NAS542 models, running on firmware version 5.21.
The new Secure Compute Module (SCM) Pro is an embedded platform built around the Raspberry Pi CM4 for IoT and edge applications requiring security features such as Verified Boot, Hardware Root of Trust, File System Encryption, Physical Tamper Sensors, etc.
A new Mirai botnet variant tracked as ‘V3G4’ targets 13 vulnerabilities in Linux-based servers and IoT devices to use in DDoS (distributed denial of service) attacks.
The Zerobot botnet, first detected earlier this month, is expanding the types of Internet of Things (IoT) devices it can compromise by going after Apache systems.
A cross-platform botnet, ‘MCCrash’ that starts out from malicious software downloads on Windows devices and spreads to a range of Linux-based devices was recently examined by the Microsoft Defender for IoT research team.
For the eighth year, the Eclipse Foundation has surveyed Internet of Things (IoT) and edge developers, finding that when it comes to workloads, artifacts and OS choices, artificial intelligence (AI), containers and Linux all rank highly.
Canonical, the company behind top Linux distro Ubuntu, has announced a new variant of the open source operating system, optimized for IoT and edge devices.
With IoT, 5G and embedded devices becoming a larger part of everyone’s daily lives, security—and more importantly, trust in our technology—is on everyone’s minds. Embedded devices don’t have a good security track record; the last several years saw a significant number of high-profile hacks that could prevent people from widely accepting IoT into their homes.
Security researchers have found and reported 14 vulnerabilities in the BusyBox userspace tool that's used in millions of embedded devices running Linux-based firmware. While the flaws don't have high criticality, some of them do have the potential to result in remote code execution (RCE). These flaws highlight the need for consistent IoT updates.
Imagine reading a headline in tomorrow’s news stating that your neighbor’s identity was stolen and their life savings cleaned out by criminals who entered through their ‘smart’ washing machine. Sound ridiculous? Well, have you checked your own home Wi-Fi network lately?
The Linux Foundation is teaming up with companies like Target, Microsoft and Veritone to create the Open Voice Network, an initiative designed to "prioritize trust and standards" in voice-focused technology. Linux Foundation representatives said the Open Voice Network would support the platforms by "delivering standards and usage guidelines for voice assistant systems that are trustworthy, inclusive and open."
A project that aims to put an ultra-tiny Linux board in a standard USB wall charger is in the works. Such a device could be installed at a target location and phone home over the Internet, providing a back door into what might be an otherwise secure network.