IoT Security – Part 1 of 3: IoT Security Architecture on the Device and Communication Layers

IoT Security – Part 1 of 3: IoT Security Architecture on the Device and Communication Layers
by Padraig Scully on 12-01-2016 at 4:00 pm

The massive scale of recent DDoS attacks on DYN’s servers that brought down many popular online services in the US, gives us just a glimpse of what is possible when attackers are able to leverage up to 150,000 unsecure IoT devices as malicious endpoints.

To address the growing fear and uncertainty out there surrounding the IoT security… Read More


The New Reality for IoT Security

The New Reality for IoT Security
by Matthew Rosenquist on 11-28-2016 at 4:00 pm

Recent Distributed Denial of Service (DDoS) attacks are forcing a shift in Internet-of-Things (IoT) security thinking. The dangers are expanding as attackers are taking advantage of billions of IoT devices, conscripting them into their botnet armies for massive DDoS attacks.… Read More


Is your #IoT cup half empty or half full?

Is your #IoT cup half empty or half full?
by Diya Soubra on 11-25-2016 at 7:00 am

While the optimist and the pessimist argued about whether the cup was half empty or half full, I drank it !

I had seen the above statement a while ago and it jumped to mind while I was considering the state of #IoT today. That funny statement describes exactly the mindset of the players in the market. While the majority argue back and forth… Read More


Webinar: Improve Security For IoT Edge Devices With Custom SoCs

Webinar: Improve Security For IoT Edge Devices With Custom SoCs
by Daniel Nenni on 11-19-2016 at 7:00 am

The only thing hotter than IoT on SemiWiki.com right now is IoT Security. In 2016 we saw a record amount of reported cyber security breaches with compelling consequences (US Presidential Election) and that trend will continue. The most recent DDoS (distributed denial of service) attacks using botnets on insecure IoT devices … Read More


IoT Worms Could Spread Like Zombies

IoT Worms Could Spread Like Zombies
by Matthew Rosenquist on 11-18-2016 at 12:00 pm

AAEAAQAAAAAAAAlfAAAAJGJjZjlmZGUxLWJlZmYtNDY3ZS04MWRhLTA4YWVmYTg1OTJiNA

Security researchers recently created a proof-of-concept attack against Internet connected lightbulbs, causing breached devices to reach out and infect their neighbors. Propagation continues and spreads itself across the community. This hack highlights the insecurity in one of many IoT network protocols.

Researchers… Read More


The IoTrojan Horse – an army of toasters

The IoTrojan Horse – an army of toasters
by Bill Montgomery on 10-30-2016 at 4:00 pm

Most everybody is familiar with the term Trojan Horse, drawn from Greek mythology. It’s a tale from the Trojan War where, after a fruitless 10-year attempt to capture the city of Troy, the Greeks constructed a huge wooden horse, left it outside the city walls, and then sailed away, seemingly accepting defeat. The Trojans were elated,Read More


Top 5 Things to Know About Recent IoT Attacks

Top 5 Things to Know About Recent IoT Attacks
by Matthew Rosenquist on 10-30-2016 at 12:00 pm

Recent internet attacks resulted in popular sites becoming unreachable, such as Twitter, Etsy, Spotify, AirBnB, Github, and the New York Times. These incidents have brought to light a new threat to online services: Internet of Things (IoT) botnets. Distributed Denial of Service (DDoS) attacks have been commonplace for over… Read More


5 Best Practices For Developing Secure IoT Solutions

5 Best Practices For Developing Secure IoT Solutions
by Padraig Scully on 10-16-2016 at 7:00 am

Security is often an afterthought when developing IoT solutions. Security features are commonly cut from initial designs to accommodate additional device functionality. However, security needs to play a central role in IoT projects if we are to secure the Internet of Things.

The process of developing secure IoT solutions was… Read More


IOT Security – Ongoing Challenge

IOT Security – Ongoing Challenge
by Bill McCabe on 09-14-2016 at 12:00 pm

It is near impossible to read or have a conversation about IoT, without security becoming a major topic. For IT professionals involved with IoT projects, security needs to be a major consideration, starting with planning and design, and continuing all the way through to deployment, implementation, and maintenance. Security… Read More