Attacks on Internet of Things (IoT) systems continue to make headlines. All devices on publicly accessible networks are being targeted. While the use of IoT devices is increasing at an unprecedented rate, security for these vulnerable devices is painfully and unnecessarily lagging behind.
Recent WikiLeaks documents allege that the CIA developed, or sought to develop, or even “borrowed,” cyberattack technology that could target a wide range of IoT devices, including smart TVs, connected cars, and mobile phones. In the case of smart TVs and mobile phones, the attacks allowed these devices to be used to eavesdrop on either voice communication, data communication, or both.
Icon Labs President Alan Grau selected to present at Embedded World Show Europe
Tuesday March 14, Session 05: Security II – Hacking & Attacking 4:30-5:00pm
By David West
The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices that have sensing or actuation capabilities, and are connected to each other via the internet.
Floodgate IoT Security Toolkit enables IoT edge devices to be easily and securely integrated with IoT cloud platforms, including Verizon’s ThingSpace IoT Cloud Platform, and provides security management for remote IoT devices from a single user interface.
by Max Maxfield
The Industrial Internet of Things (IIoT), which is also called the Industrial Internet, is the domain of industry, government and other realms. It is logistics, fleet management, factory floors, power plants, utilities and other non-consumer facing elements.
Although several hacks have already been demonstrated on connected vehicles, none of those attacks have resulted in direct financial loss or injury to the consumer.
When it comes to protecting IoT devices OEMs can no longer rely on obscurity or a secure perimeter model. As Icon Labs explain, security must begin at home with a device capable of defending itself against network attacks.