Some things really, really shouldn’t be turned into IoT devices – including vending machines
![Internet-Enabled Drill Demonstrates IoT Security Done Right Internet-Enabled Drill Demonstrates IoT Security Done Right](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Internet-Enabled Drill Demonstrates IoT Security Done Right
Researchers find flaws in an internet-connected drill, but say minimal, hard-to-find bugs indicate there is hope for IoT security.
![IoT Malware Activity Already More Than Doubled 2016 Numbers IoT Malware Activity Already More Than Doubled 2016 Numbers](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
IoT Malware Activity Already More Than Doubled 2016 Numbers
The number of new malware samples in the wild this year targeting connected internet-of-things (IoT) devices has already more than doubled last year’s total.
![News in brief: Dubai launches its first robocops; Samsung woes over iris recognition; IoT security criticised News in brief: Dubai launches its first robocops; Samsung woes over iris recognition; IoT security criticised](https://xploiter.com/wp-content/uploads/sites/6/2016/11/naked-security-logo.png)
News in brief: Dubai launches its first robocops; Samsung woes over iris recognition; IoT security criticised
Your daily round-up of some of the other stories in the news
![The Time Has Arrived to Embrace Hackers The Time Has Arrived to Embrace Hackers](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
The Time Has Arrived to Embrace Hackers
Source Boston keynoter Keren Elazari sounded a call to action for industry to extend an acceptance of hackers.
![Lack of Security Talent Afflicts Healthcare Lack of Security Talent Afflicts Healthcare](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Lack of Security Talent Afflicts Healthcare
At Source Boston, Josh Corman of the Atlantic Council said that healthcare is suffering from a lack of security talent, devices rife with vulnerabilities, and government incentivizing bad behavior.
![Hyundai Patches Leaky Blue Link Mobile App Hyundai Patches Leaky Blue Link Mobile App](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Hyundai Patches Leaky Blue Link Mobile App
Hyundai Motor America patched its Blue Link mobile app after researchers found a cleartext encryption key that could be use to expose user and vehicle information.
![Samsung Tizen Security ‘Feels like 2005’ Samsung Tizen Security ‘Feels like 2005’](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Samsung Tizen Security ‘Feels like 2005’
A researcher at the Security Analyst Summit described the insecure state Samsung’s Tizen operating system.
![Beta Firmware Updates Available for Vulnerable Netgear Routers Beta Firmware Updates Available for Vulnerable Netgear Routers](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Beta Firmware Updates Available for Vulnerable Netgear Routers
Netgear has built beta firmware updates for its Nighthawk routers vulnerable to a command injection attack disclosed last week.
![Netgear Routers Remain Exposed to Critical Flaw Netgear Routers Remain Exposed to Critical Flaw](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Netgear Routers Remain Exposed to Critical Flaw
Netgear has confirmed a critical vulnerability in its Nighthawk routers that expose devices to command injection attacks. A public exploit is available.