article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. As with the rest of the IoT landscape, there's a lot of scope for improvement here and also just like the other IoT posts, it gets very complex for normal people very quickly.

IoT 363
article thumbnail

Understanding the U.S. Cyber Trust Mark: A New Era for IoT Security

SecureWorld News

Cyber Trust Mark, a voluntary cybersecurity labeling program designed to help consumers make informed decisions about the security of their internet-connected devices. From baby monitors to home security systems, these IoT products have become integral to daily life, yet they also present significant cybersecurity risks.

IoT 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Used Tesla Components Contain Personal Information

Schneier on Security

Used Tesla components, sold on eBay, still contain personal information , even after a factory reset. It will be a problem with IoT devices. This is a decades-old problem. It's a problem with used hard drives. It's a problem with used photocopiers and printers.

IoT 266
article thumbnail

Public Hearing on IoT Risks

Schneier on Security

The US Consumer Product Safety Commission is holding hearings on IoT risks: The U.S. Consumer Product Safety Commission (CPSC, Commission, or we) will conduct a public hearing to receive information from all interested parties about potential safety issues and hazards associated with internet-connected consumer products.

IoT 235
article thumbnail

New IoT Security Regulations

Schneier on Security

Or the current generation of implanted pacemakers, which can both receive commands and send information to doctors over the internet. And for products borne out of the Internet of Things, this means the risk of having personal information stolen or devices being overtaken and controlled remotely. This law is not a panacea.

IoT 259
article thumbnail

Are the Police using Smart-Home IoT Devices to Spy on People?

Schneier on Security

IoT devices are surveillance devices, and manufacturers generally use them to collect data on their customers. What is common for Internet companies is to publish "transparency reports" that give at least general information about how police are using that data. IoT companies don't publish those reports. BoingBoing post.

IoT 270
article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages. Related: Companies sustain damage from IoT attacks That was back in 1982.

IoT 279