Remove Accountability Remove Firmware Remove IoT Remove Workshop
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. I also looked at custom firmware and soldering and why, to my mind, that was a path I didn't need to go down at this time. Now for the big challenge - security. Let's dive into it.

IoT 358
article thumbnail

IoT Secure Development Guide

Pen Test Partners

IoT Design Frameworks 2.2. Threat modeling can be applied to a wide range of things, including software, applications, systems, networks, distributed systems, Internet of Things (IoT) devices, and business processes. Deploy malicious firmware. Table of contents 1. Threat Modelling 1.1. Why threat modelling is important 1.2.

IoT 52
article thumbnail

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

There aren’t any corroborating accounts of this scoop so far, but it is both fascinating and terrifying to look at why threats to the global technology supply chain can be so difficult to detect, verify and counter. That in itself should be zero gauge of the story’s potential merit. Even if the U.S. consumers or the U.S.