Zingbox IoT Guardian is the industry’s first and also the most widely deployed security and analytics platform. From its launch in 2014, we have taken a wholistic approach to device lifecycle management when securing and managing connected medical devices.
I just finished presenting at HIMSS19 Cybersecurity Command Center. As much as I hope attendees enjoyed an informative session, I personally enjoyed how much insight I took away from the audience. I wanted to take a few minutes now and share the insight I was
The Zingbox Security Research Team identified an IoT botnet campaign targeting Android-powered devices in November and December of 2018. The perpetrators dropped different variants that set up a backdoor to give themselves remote control of the victim and expand to other hosts via known exploits
Robotic telepresence is a next-generation technology that allows a person in one location to replicate himself in another. The remote person can see you, hear you, interact with you, and move all around your location. But wait a second! What if the person behind the
A Hacker can learn important system and device details from the information available in error messages. By analyzing this information, the hacker can tailor the attack to exploit vulnerabilities associated with the OS and applications running on the device, greatly increasing the chance of successful
As I speak with more and more customers regarding the management and security of IoT devices, it’s become abundantly clear that integration between various solutions is a critical component that’s often overlooked. That’s why I’m so excited about the Zingbox-Cisco announcement to integrate our respective
Ploutus is an ATM Malware discovered in 20131 that targets ATMs manufactured by NCR in Mexico., Since its discovery, the malware has been a nightmare for Latin America banks enabling criminals to steal more than $45 millions dollars.
Ploutus gained a lot of media coverage thanks
The terms “Hacker” and “Malware” are part of our daily vocabulary due to its significant impact on society, enterprises, and individuals alike. There is a good chance you or someone you know has been impacted by cyberattacks. These attacks come in many shapes and forms.
It’s been about 3 months since I shared my research at DefCon surrounded by fellow white hat hackers, representatives from the device manufacturers, FDA and yes, Department of Homeland Security. The presentation was a culmination of research that started months before DefCon and culminated with