Software Integrity Blog

Archive for the 'IoT Security' Category

 

Feds seek to up their cybersecurity game

Recent government cybersecurity initiatives assume that the federal government has a role to play in securing the IoT and critical infrastructure. Does it?

Continue Reading...

Posted in IoT Security

 

The cyber-physical convergence is accelerating—and so are the risks

Cyber-physical attacks are on the rise. As the IoT creeps further into our daily lives, so does the attack surface. What can we do to keep ourselves safe?

Continue Reading...

Posted in IoT Security

 

The IoT: Still feature rich, security poor

How to prevent IoT hacks: Secure your software before you release it. It’s not that hard. So why aren’t more IoT device manufacturers doing it?

Continue Reading...

Posted in IoT Security

 

GAO report confirms major gaps in government cybersecurity

The September GAO cybersecurity report stated that there are about 1,000 outstanding recommendations for automotive, military, and IoT security, among others.

Continue Reading...

Posted in Automotive Cyber Security, IoT Security

 

Better passwords in California won’t help much

The new California password law demonstrates lawmakers’ misunderstanding of how connected devices work, how the internet works, and even how passwords work.

Continue Reading...

Posted in IoT Security, Software Compliance, Quality & Standards

 

Make your home both smart and secure | NCSAM at Synopsys

Smart devices are terrifyingly insecure, and industry and government have failed to fix the issue. Here are seven tips to secure your smart home.

Continue Reading...

Posted in IoT Security

 

The IoT within us: Network-connected medical devices

The Internet of Things is now inside us. But network-connected medical devices are troubling, considering the history of medical device vulnerabilities.

Continue Reading...

Posted in Healthcare Security & Privacy, IoT Security, Medical Device Security

 

Ukraine dodges attack, but VPNFilter threat remains

Ukraine had been warned. So it was prepared.

Continue Reading...

Posted in IoT Security

 

Vulnerable routers are still out there—and hackers are noticing

Vulnerable routers aren’t news Long ago and far away—in 2014, which is indeed long ago and far away in our cutting-edge world of information technology—security gurus like Dan Geer, Jim Gettys, and Bruce Schneier were issuing urgent warnings about the catastrophic insecurity of routers—those devices in our homes that give us access to the World Wide Web.

Continue Reading...

Posted in IoT Security, Static Analysis (SAST)

 

Is IoT a tool for Big Brother via DMCA?

What if it turns out that Big Brother is much more diverse, and a bit more subtle, than a monolithic figure at the head of an intrusive, tyrannical government?

Continue Reading...

Posted in IoT Security