IoT Security

IoT Security News – Still Many Ports of Entry for Malefactors

Every device connected to the internet is a potential point of vulnerability. As the following report shows, design engineers and developers must anticipate security threats at every stage between a device’s design and deployment. Remote Peeping into Bedrooms and Offices In June 2017, some residents of Dubai, UAE, discovered to their alarm that footage from…

Read More

SecureRF Delivers Future-Proof Security Tools for IoT Designers Using Intel FPGAs

Intel’s DE10-Nano kit, based on a system-on-chip (SoC) field programmable gate array (FPGA), is an ideal development platform for developers who require design flexibility while creating innovative applications for the Internet of Things (IoT). Now, developers using this board, which features a Cyclone V FPGA, can take advantage of SecureRF’s market-ready DE10-Nano Security Toolkit to…

Read More

Making the Business Case for IoT Security

If you’re an engineer working on products made for the Internet of Things (IoT), you understand the importance of device security, authentication, and data protection. You also know many P&L-fixated executives don’t see an immediate value in funding enhanced IoT product security. Even some of the most technically inclined business leaders have a hard time…

Read More

IoT in the Movies

The Internet of Things (IoT) has been appearing in movies for several years now—in some cases, even before there was an IoT. Sometimes, the technology depicted is fanciful, but at other times, Hollywood weaves into its narratives technologies that already exist or are looming just over the horizon. Below, we look at the IoT technologies…

Read More

IoT Security News — Issues with Authentication and Open Ports

When it comes to the IoT, it is essential to incorporate security into the products during the design phase and anticipate the need  to react to new threats. IoT security is an ever-evolving challenge. The news items below about IoT security breaches show that attackers and security experts continue to find new vulnerabilities, often in devices…

Read More

IoT Security Vulnerabilities of Smart Cities

As IoT devices become smaller and cheaper, more cities are leveraging them to transform themselves into smart cities. Smart cities use IoT devices and technologies to improve the efficiency of their services and assist their citizens in a variety of ways. Smart city IoT applications include: Traffic-management systems that reduce congestion and save money on…

Read More

The Value of Data Protection in the Internet of Things

The IoT is made up of billions of devices that collect and share data. If this data is not properly secured, it puts both end-users and manufacturers at risk for all sorts of disastrous consequences. For example, the data collected by a smart thermostat can reveal when someone is home based on their heating and…

Read More

The Biggest IoT Security Threat: Failure of Imagination

IoT security experts agree that a rise in security failures is inevitable this year given that more and more companies are deploying IoT sensors and devices, many of which are not properly secured. In fact, analysts with Forrester and Strategic Cyber Ventures go so far as to predict widespread and large-scale security breaches. We believe…

Read More

Sensor Security in Manufacturing and Construction IoT Applications

Manufacturing and construction depend on large networks of sensors, actuators and controllers to operate, control and monitor systems and processes. Much of the equipment used in these industries comes with built-in devices for sensing, data collection and communicating. The data flowing through these devices helps both industries meet a number of requirements including efficiency, safety,…

Read More

SecureRF’s IoT Security Solutions Available on the Arrow Chameleon96 Community Board

SecureRF’s asymmetric (public-key) cryptographic protocols are available on the new Arrow Chameleon96 community board. The company’s security tools enable deployment of small, fast and ultra-low-energy solutions providing integrity, authentication and non-repudiation for IoT devices. IoT devices are often deployed with little or no protection because most security solutions do not have acceptable runtimes, need a…

Read More