How to Protect Connected Home Devices and Appliances from Cyber Attacks

Tags: , , , , |

By David West, Engineering Director of Icon Labs. The original article can be seen here. In July of 2014, HP Labs did a study of 10 popular IoT devices and found security was shockingly bad. The researchers studied 10 devices, looking at end-to-end security capabilities including privacy protection, authorization, encryption, user interface protection, and

Is the Tesla Model S robust against hackers?

Tags: , , , , , , , |

In his talk "What I learned about IoT from hacking the Tesla Model S" given at the IoT Security Foundation's inaugural conference (Royal Society, London, Dec '15), Marc Rogers outlined how he managed to hack into the electronic systems of the iconic $90,000 car.   Yet despite finding a number of significant vulnerabilities, Marc not