The security implications of devices connecting and sharing data
Internet of Things
More than three dozen cybercrime and digital forensics experts from 23 countries have investigated a simulated attack on a bank that had been carried out through an IoT device.
The big challenge with IoT devices is that they are all different: Each manufacturer has its own firmware, uses different protocols, and designs its own architecture. So, the first step before carrying out any analysis is to understand the architecture, find out what components are involved, and how they interact and communicate among themselves.
The Internet of Things (IoT) can be a network of connected convenience but this should not come at the expense of safeguarding your privacy and the personal data that connected devices collect and share.
It is not feasible, in fact not even possible, to replace all CPUs in all devices. It would be too costly, besides the success rate for unsoldering and resoldering pin-throughs in multi-layer boards will never be 100%.
For years, IoT security seemed like solving a problem that didn’t exist. Not anymore says ESET's Cameron Camp, who was at this year's CES.
IoT attacks are on the rise. As the technology becomes more relevant to our lives, we take a look at what the state of play is.
It seems the current DDoS tactics from cybercriminals is to gain control over millions of IoT devices and direct their power towards any target they choose.
IoT devices, while extremely useful for simplifying various mundane aspects of everyday life, also offer criminals a new attack platform: your appliances.
IoT security matters more than ever, explains ESET's Cameron Camp, as the technology, which offers us so much, is vulnerable to attack from cybercriminals.
The current hype, this Christmas and beyond, is the connected toy. Not sure what that means? Well, here are seven things you need to know about this increasingly popular plaything.
A new report found hundreds of serious security flaws in some of the most popular Internet of Things gadgets - the problem is far deeper than thought, with 70% of the most popular such gadgets having serious security flaws.
Google’s Nest thermostat can be hacked in under a minute, according to a blog post and video posted by GTV Hacker. The hack would allow attackers complete control over the device and access to the user’s home network.