Remove topic 2
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. In part 2 , I covered IP addresses and the importance of a decent network to run all this stuff on, followed by Zigbee and the role of low power, low bandwidth devices.

IoT 358
article thumbnail

Our Principles for IoT Security Labeling

Google Security

Over the past year, we’ve been excited to see more focused activity across policymakers, industry partners, developers, and public interest advocates around raising the security and transparency bar for IoT products. Proposed Principles for IoT Security Labeling Schemes We believe in five core principles for IoT labeling schemes.

IoT 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ubiquiti: Change Your Password, Enable 2FA

Krebs on Security

Ubiquiti , a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders, security cameras and access control systems, is urging customers to change their passwords and enable multi-factor authentication. ” To manage your security settings on a Ubiquiti device, visit [link] and log in. .

Passwords 332
article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is very crowded. billion devices will be connected to the Internet by 2020 2. Connected things are what make the IoT – sensors, cameras, wearable electronics, medical devices, automatic controls. But making the IoT work requires trust in the devices and the data they collect.

IoT 72
article thumbnail

Decoding Security 127: We Got Conned

SiteLock

The conference held many briefings on politics, legislation, and Machine Learning (ML) and Artificial Intelligence (AI) in cybersecurity, as well as the challenge of endpoint security for many IoT devices. Does your financial institution respect your 2-factor authentication?

article thumbnail

Weekly update 58

Troy Hunt

For now, I've caught up on the whole IoT warning thing I totally overlooked last week. So get in there and do something awesome with HIBP, you've got just under 2 weeks, go! I missed the IoT warnings piece last week so I've carried it forward to today (what if we actually put warnings on them like we do cigarette packs?). (but

IoT 110
article thumbnail

The 7 Biggest Cybersecurity Scoops from February 2015

SiteLock

The Internet of Things (IoT) has become of the most popular technologies in recent years, connecting real-world devices with the internet – such as connected cars, wearables and even virtual reality headsets. One concern with IoT has been security – how much is the Internet of Things exposed to cyber threats, and how are they affected?