Amazon started implementing a 2FA system for all their Ring users. This should help stop hackers from getting an easy foothold on someone’s network.
A recent report shows that a majority of security professionals are confident in their product security, but can’t prove that they are safe enough. This is indeed worrying.
Your smart home can be a target for hackers if you don’t secure it properly. Here are some things you can do to secure your smart home.
The more IoT devices you add to your network, the more avenue you open up for hackers to attack you. It’s best to segregate your network for IoT devices.
A recent report has discovered a nasty exploit within Philips Hue which shows that even light bulbs are a nasty threat in the IoT world.
IoT has a rough history with security. This has prompted countries to implement stricter IoT laws to improve the security of the devices.
The Amazon Ring Doorbell’s security issues have gotten so bad that even an Amazon employee is calling for the Ring Doorbell to be shut down.
A list of 500,000 IoT credentials made their way onto the Internet. The list was posted on a hacker forum for anyone to see and use.
Today’s children are the first of their generation to be born during the IoT revolution. Here are a few tips to help keep children safe in the IoT era.
Kali Linux can be used to perform a variety of penetration tests on your PC. Here are some penetration testing strategies for IoT devices with Kali Linux.
A recent spike of Ring camera hacks has shown the darker side of entrusting home security to IoT. Here is what happened and what you should know.
Many smart devices don’t come with a password, yet security advice calls for you to change the password on IoT devices. What does this really mean?
The FBI has recently released a warning that smart-home networks should be on a separate network than the primary home network. That way, hackers can’t access your personal data.
The Which! website tested a few smart toys and kids’ karaoke machines and found that the majority had questionable security.
While Blockchains are important for storing permanent data that cannot be changed, it also brings a new privacy issue – how can confidential data be removed from blockchains?
Researchers have discovered that entertainment corporations are exploiting the communication capabilities of smart TVs to gather market analysis data.
The proliferation of IoT devices has now planted cameras in every part of the house and city. Can anyone just hack and watch you on the camera? Let’s find out.
It’s no breaking news that IoT is under heavy attack. In the first half of 2019, Kaspersky’s IoT honeypot saw 105 million attacks against their devices.