sharing IoT Security Glass Half Full

Amazon Sidewalk, Apple AirTag and Involuntary Sharing

If you own an Amazon device (Ring, Echo, Dot, Plus, Show, Spot, Studio, Input or Flex) then starting this week, you may be sharing at least some attributes of your device with ...
Security Boulevard
How to Provide IoT Security in the ‘Connected Everything’ Era: NIST Guidelines

How to Provide IoT Security in the ‘Connected Everything’ Era: NIST Guidelines

Do you remember the name Mirai? Sure, you do. Back in 2016, Mirai became the first IoT botnet to make headlines by hitting global DNS provider Dyn and taking down almost half ...
Why CSPs Should Care About Phishing

Why CSPs Should Care About Phishing

Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to ...
Jethro Tull - Thick As A Brick

Silex Malware: Deadly New Virus Bricks 1000s of IoT Devices

Your IoT’s not sick – Someone just turned it into a brick! A 14-year-old hacker created a new strain of malware called “Silex malware” which bricked over 4000 IoT devices in the ...
Brute Force Attacks on IoT – Here to Stay?

Brute Force Attacks on IoT – Here to Stay?

IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, ...
5 Key Takeaways from #MWC19

5 Key Takeaways from #MWC19

MWC went by so fast that you may have missed some of the highlights. Luckily, we’ve compiled the following takeaways from the Barcelona conference. With apologies to Don Adams, it really is ...
Home Digital Asset Security

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a ...