Yossi Weisblum will be presenting ARM’s IoT security solution during the Open Silicon webinar that I am moderating next week. Yossi manages product marketing for ARM’s CryptoCell subsystem. He has an extensive background in product marketing across several platforms, including connectivity, wireless, multimedia and mobile.… Read More
Tag: iot security
IoT Security – Part 1 of 3: IoT Security Architecture on the Device and Communication Layers
The massive scale of recent DDoS attacks on DYN’s servers that brought down many popular online services in the US, gives us just a glimpse of what is possible when attackers are able to leverage up to 150,000 unsecure IoT devices as malicious endpoints.
To address the growing fear and uncertainty out there surrounding the IoT security… Read More
The New Reality for IoT Security
Recent Distributed Denial of Service (DDoS) attacks are forcing a shift in Internet-of-Things (IoT) security thinking. The dangers are expanding as attackers are taking advantage of billions of IoT devices, conscripting them into their botnet armies for massive DDoS attacks.… Read More
Is your #IoT cup half empty or half full?
While the optimist and the pessimist argued about whether the cup was half empty or half full, I drank it !
I had seen the above statement a while ago and it jumped to mind while I was considering the state of #IoT today. That funny statement describes exactly the mindset of the players in the market. While the majority argue back and forth… Read More
Webinar: Improve Security For IoT Edge Devices With Custom SoCs
The only thing hotter than IoT on SemiWiki.com right now is IoT Security. In 2016 we saw a record amount of reported cyber security breaches with compelling consequences (US Presidential Election) and that trend will continue. The most recent DDoS (distributed denial of service) attacks using botnets on insecure IoT devices … Read More
IoT Worms Could Spread Like Zombies
Security researchers recently created a proof-of-concept attack against Internet connected lightbulbs, causing breached devices to reach out and infect their neighbors. Propagation continues and spreads itself across the community. This hack highlights the insecurity in one of many IoT network protocols.
Researchers… Read More
The IoTrojan Horse – an army of toasters
Most everybody is familiar with the term Trojan Horse, drawn from Greek mythology. It’s a tale from the Trojan War where, after a fruitless 10-year attempt to capture the city of Troy, the Greeks constructed a huge wooden horse, left it outside the city walls, and then sailed away, seemingly accepting defeat. The Trojans were elated,… Read More
Top 5 Things to Know About Recent IoT Attacks
Recent internet attacks resulted in popular sites becoming unreachable, such as Twitter, Etsy, Spotify, AirBnB, Github, and the New York Times. These incidents have brought to light a new threat to online services: Internet of Things (IoT) botnets. Distributed Denial of Service (DDoS) attacks have been commonplace for over… Read More
How to Secure the Future of IoT
The world of IoT security just became more complex. IoT devices are no longer a potential threat to their owners, now they pose a significant threat to everything connected to the Internet.… Read More
5 Best Practices For Developing Secure IoT Solutions
Security is often an afterthought when developing IoT solutions. Security features are commonly cut from initial designs to accommodate additional device functionality. However, security needs to play a central role in IoT projects if we are to secure the Internet of Things.
The process of developing secure IoT solutions was… Read More