Remove Firmware Remove IoT Remove Workshop
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. I also looked at custom firmware and soldering and why, to my mind, that was a path I didn't need to go down at this time. Now for the big challenge - security. Let's dive into it.

IoT 356
article thumbnail

IoT Secure Development Guide

Pen Test Partners

IoT Design Frameworks 2.2. Threat modeling can be applied to a wide range of things, including software, applications, systems, networks, distributed systems, Internet of Things (IoT) devices, and business processes. Deploy malicious firmware. Table of contents 1. Threat Modelling 1.1. Why threat modelling is important 1.2.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

And, there’s thirty more villages including Girls Hack Village, the Voting Machine Hacking village, the IoT Village, and the Bio Hacking village. We had a display area where the cantenna that we mentioned before was on display had a small workshop. In each you will find people with like interests. You will learn cool new things.

Hacking 40
article thumbnail

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

Take, for instance, the problem right now with insecure Internet of Things (IoT) devices — cheapo security cameras, Internet routers and digital video recorders — sold at places like Amazon and Walmart. Over the decades, the security of the supply chain became an article of faith despite repeated warnings by Western officials.