While Blockchains are important for storing permanent data that cannot be changed, it also brings a new privacy issue – how can confidential data be removed from blockchains?
Researchers have discovered that entertainment corporations are exploiting the communication capabilities of smart TVs to gather market analysis data.
The proliferation of IoT devices has now planted cameras in every part of the house and city. Can anyone just hack and watch you on the camera? Let’s find out.
It’s no breaking news that IoT is under heavy attack. In the first half of 2019, Kaspersky’s IoT honeypot saw 105 million attacks against their devices.
You may have a lot of smart devices and don’t remember which ones have access to the Internet. Here is how to find the devices connected to your router.
Your IoT devices can be roped into being part of a DDoS attack. Find out the steps you can take to prevent your IoT devices from becoming a botnet.
One of the major sources of cyberattacks are DDoS botnets which target insecure IoT devices. Learn what is DDoS botnet and how to tackle them.
When using Amazon Echo, saying “Alexa” makes it available to act on commands. This is a security problem that may lay you open to victimization by hackers.
Security is most crucial in healthcare, where successful attacks can result in loss of life. Irdeto gave some insight into how healthcare comes under attack from malicious agents.
As countries become “smarter,” more hackers are doing IoT attacks to disrupt everyday life. India has been the most attacked country in the world.
More than 400 police forces in the U.S. are partnering up with Ring Doorbell and have been granted potential access to homeowner camera footage.
Your smart home devices are not as secure as you think; that is why it is necessary to have a firewall. Learn how to configure your router as an IoT firewall.
Microsoft has warned that the Russian government hackers have been breaching computer networks by using IoT devices, as well as video decoders and priners.
We have heard plenty of stories about how insecure IoT devices are. The next question is, why aren’t IoT devices more secure?
Smart devices hold a lot of your data, so they need to be wiped when you are giving them away. Learn how to wipe your smart devices before selling them.
The central concept of Zero Trust architecture can be summed up as “never trust, always verify.” This can reduce your risk against both internal and external threats.
Wi-Fi cameras are more secure than they’ve ever been, but with something with so many potential privacy-related implications, it can’t hurt to be careful.
As IoT makes our lives easier, it also adds a potential door for intruders. Here are some IoT security solutions for a few of the most common IoT security issues.