Remove topic 1
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. As with the rest of the IoT landscape, there's a lot of scope for improvement here and also just like the other IoT posts, it gets very complex for normal people very quickly.

IoT 358
article thumbnail

Weekly Update 212

Troy Hunt

It's a bit of a mega one this week running over the 1-hour mark, but there's been an awful lot happen during the last week that I reckon is of interest. The IoT chastity lock with the vulnerability which may require an angle grinder to cut it off you (wow ??) Watch Episode 1: How Far can Wi-Fi Travel? SecurityFWD.

IoT 234
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FDA medical IoT cyber device compliance. FD&C 524b

Pen Test Partners

But as of October 1 st , 2023, the FDA is firm about their new cybersecurity requirements for all submissions. We’ll be publishing more on this topic soon, particularly the value and importance of pen testing medical devices, for 524b and also the entire development journey of the device. In short, quite a bit!

IoT 68
article thumbnail

Our Principles for IoT Security Labeling

Google Security

Over the past year, we’ve been excited to see more focused activity across policymakers, industry partners, developers, and public interest advocates around raising the security and transparency bar for IoT products. Proposed Principles for IoT Security Labeling Schemes We believe in five core principles for IoT labeling schemes.

IoT 74
article thumbnail

Million of Telestar Digital GmbH IoT radio devices can be remotely hacked

Security Affairs

A security researcher disclosed zero-day flaws in Telestar Digital GmbH IoT radio devices that could be exploited by remote attackers to hijack systems without any user interaction. Nevertheless, the protocol on network level and in end devices is still a bigger topic than originally thought.” ” continues the experts.

IoT 92
article thumbnail

Ubiquiti: Change Your Password, Enable 2FA

Krebs on Security

Ubiquiti , a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders, security cameras and access control systems, is urging customers to change their passwords and enable multi-factor authentication. ” To manage your security settings on a Ubiquiti device, visit [link] and log in. .

Passwords 332
article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is very crowded. billion 1 , and Gartner projects over 20.8 Connected things are what make the IoT – sensors, cameras, wearable electronics, medical devices, automatic controls. But making the IoT work requires trust in the devices and the data they collect. Connected devices outnumber people.

IoT 72