article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. As with the rest of the IoT landscape, there's a lot of scope for improvement here and also just like the other IoT posts, it gets very complex for normal people very quickly.

IoT 358
article thumbnail

STEPS FORWARD: Regulators are on the move to set much needed IoT security rules of the road

The Last Watchdog

New government rules coupled with industry standards meant to give formal shape to the Internet of Things (IoT) are rapidly quickening around the globe. When it comes to IoT, we must arrive at specific rules of the road if we are to tap into the full potential of smart cities, autonomous transportation and advanced healthcare.

IoT 220
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Used Tesla Components Contain Personal Information

Schneier on Security

Used Tesla components, sold on eBay, still contain personal information , even after a factory reset. It will be a problem with IoT devices. This is a decades-old problem. It's a problem with used hard drives. It's a problem with used photocopiers and printers.

IoT 307
article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages. Related: Companies sustain damage from IoT attacks That was back in 1982.

IoT 279
article thumbnail

Exploring IoT Communication Protocols for Enhanced Cybersecurity

Security Boulevard

In the era of interconnected devices, the Internet of Things (IoT) has revolutionized the way we live and work. However, with this convenience comes the pressing need for robust cybersecurity measures to safeguard sensitive information and ensure the integrity of the IoT ecosystem.

IoT 64
article thumbnail

Attacks Escalating Against Linux-Based IoT Devices

eSecurity Planet

Incidents of malware targeting Linux-based Internet of Things (IoT) devices jumped by more than a third in 2021, with three malware families the primary drivers behind the increase. Threats to Open Source, IoT. Also read: Top IoT Security Solutions for 2022. IoT devices pose two fundamental threats,” he said.

IoT 145
article thumbnail

Health Care Under Cyberattack: Unprotected Medical IoT Devices Threaten Patient Care

Security Boulevard

Connected devices bring organizations more information and convenience, but they also increase an organization’s attack surface—and medical devices are no different. Capterra’s 2022 Medical IoT Survey was conducted. Capterra’s 2022 Medical IoT Survey was conducted.

IoT 122