How to Protect Connected Home Devices and Appliances from Cyber Attacks

Tags: , , , , |

By David West, Engineering Director of Icon Labs. The original article can be seen here. In July of 2014, HP Labs did a study of 10 popular IoT devices and found security was shockingly bad. The researchers studied 10 devices, looking at end-to-end security capabilities including privacy protection, authorization, encryption, user interface protection, and

How the IoT industry will self-regulate its security

Tags: , , , , , |

Ben Dickson shares his thoughts in this blog which was originally posted here on Tech Talks Blog. Following last week’s DDoS attack against Dyn, which was carried out through a huge IoT botnet, there’s a general sense of worry about IoT security—or rather insecurity—destabilizing the internet or bringing it to a total collapse. All sorts of apocalyptic