article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. As with the rest of the IoT landscape, there's a lot of scope for improvement here and also just like the other IoT posts, it gets very complex for normal people very quickly.

IoT 361
article thumbnail

On IoT Devices and Software Liability

Schneier on Security

New law journal article : Smart Device Manufacturer Liability and Redress for Third-Party Cyberattack Victims Abstract: Smart devices are used to facilitate cyberattacks against both their users and third parties.

IoT 326
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

The security flaws involve iLnkP2P , software developed by China-based Shenzhen Yunni Technology. iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders. A Webcam made by HiChip that includes the iLnkP2P software.

IoT 278
article thumbnail

Understanding the U.S. Cyber Trust Mark: A New Era for IoT Security

SecureWorld News

From baby monitors to home security systems, these IoT products have become integral to daily life, yet they also present significant cybersecurity risks. Industry leaders back the initiative Key stakeholders have expressed their enthusiasm for the Cyber Trust Mark's potential to improve IoT security and consumer trust.

IoT 115
article thumbnail

Monetization Monitor: Monetization Models and Pricing 2020

Customers demand—and suppliers offer—a diverse mix of monetization models for Software and Digital Services related to IoT Devices. Approximately a third (34%) of respondents in this year’s annual software and IoT monetization survey still rely on homegrown solutions. Fast innovation (SaaS, IoT, etc.)

article thumbnail

IoT Security Principles

Schneier on Security

The BSA -- also known as the Software Alliance, formerly the Business Software Alliance -- is an industry lobbying group. They call for: Distinguishing between consumer and industrial IoT. And if you need more security and privacy principles for the IoT, here's a list of over twenty.

IoT 241
article thumbnail

IoT Unravelled Part 2: IP Addresses, Network, Zigbee, Custom Firmware and Soldering

Troy Hunt

So, peeling back that next layer, the whole IoT space isn't just about devices that get their own IP address on your network and talk over TCP (or UDP). IoT and IP Addresses So, what happens when you start filling your home with IoT things? IoT and IP Addresses So, what happens when you start filling your home with IoT things?

Firmware 348