The growing importance of cybersecurity in the IoT era

Explore the critical role of cybersecurity in the IoT era, uncovering challenges, best practices, and future trends for securing connected devices.

Capture: Improve IoT firmware security with new firmware architecture

In this article, we shall discuss what Capture is and discuss how its application can benefit both IoT device owners and IoT device vendors.

Smart Toys and Their Cybersecurity Risks: Are Our Toys Becoming a Sci-Fi Nightmare? [updated 2021]

As smart toys get more advanced, they bring more cybersecurity risk with them.

Global world telecommunication network connected around planet Earth, internet of things (IOT), devices and connectivity concepts on a network. Vector illustration IOT

Japan’s IoT scanning project looks for vulnerable IoT devices

The growing world of IoT — and security concerns The Internet of Things (IoT) is still a baby compared to other computing technologies, but the market has a

Security in a Blue Data Background Illustration

IoT security fundamentals: IoT vs OT (Operational Technology)

Introduction: Knowing the Notions  Industrial Internet of Things (IIoT) incorporates technologies such as machine learning, machine-to-machine (M2M) commu

Security in a Blue Data Background Illustration

IoT Security Fundamentals: Intercepting and Manipulating Wireless Communications

Introduction: IoT Manufacturers Favor Convenience over Security Because IoT security is still an afterthought, cybercriminals in general consider smart de

Security in a Blue Data Background Illustration

IoT Security Fundamentals: Hardware, Software and Radio Security

What is IoT – IoT stands for Internet of Things. The Internet of Things (IoT) is the interconnection and network of various devices formed by connecting any

Security in a Blue Data Background Illustration

IoT Security Fundamentals: Detecting and Exploiting Web Application Vulnerabilities

Introduction In this article, we will be learning how to emulate a firmware for exploiting a web application vulnerability called blind command injection. T

Firmware reverse engineering: A step-by-step guide

this article walks through the steps of reverse engineering firmware to find and exploit vulnerabilities.

Calm woman relaxing meditating with laptop, no stress free relief at work concept, mindful peaceful young businesswoman or student practicing breathing yoga exercises at workplace, office meditation

Keeping Alexa out of the boardroom (and the bedroom office): IoT security tips for remote employees

Introduction  I can’t help myself. I find myself liking Alexa. She/he/it isn’t exactly a friend, but I can play music and find out the weather and do all sor