Understanding Gateway and Router Vulnerabilities

Tags: , , , , , , |

Routers, Vulnerabilities and Attacks In recent years we've paid special attention to cyber-attacks which can be initiated remotely - from anywhere across the globe. This is because they can scale very easily and have impacts on specific targets, but can also wreak havoc with collateral damage on unintended victims. Of all the devices that

IoT Security for Connected Surveillance Cameras

Tags: , , , , , , |

This blog by Robert Dobson was originally posted on Device Authority website. The IoT is expanding at a rapid rate and is expected to grow over the coming years at a pace which makes previous technology adoptions look insignificant. Predictions are that by 2020 there will be some +20 Billion connected devices worldwide. The IoT

Is the Tesla Model S robust against hackers?

Tags: , , , , , , , |

In his talk "What I learned about IoT from hacking the Tesla Model S" given at the IoT Security Foundation's inaugural conference (Royal Society, London, Dec '15), Marc Rogers outlined how he managed to hack into the electronic systems of the iconic $90,000 car.   Yet despite finding a number of significant vulnerabilities, Marc not