LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com    |  Contact Us          
Security vulnerabilities and the Internet of Things

Security vulnerabilities and the Internet of Things

We’re on the verge of setting another annual record in the number of security vulnerabilities being reported. And more and more vulnerability exploits are targeting the Internet of Things.

Botnet exploits are going after IP cameras. Smart home technologies are being hacked. Even children’s toys are being hacked and used for covert surveillance. And in one bizarre case, hackers gained access to a casino’s systems through a smart thermometer in the lobby fish tank.

But these cases raise the question of what really is a vulnerability?

Continue reading “Security vulnerabilities and the Internet of Things” »

Vulnerability management for Internet of Things and embedded systems

Vulnerability management for Internet of Things and embedded systems

The number of security vulnerabilities continues to skyrocket. After setting a record last year, the number of reported Common Vulnerabilities and Exposures (CVEs) is on pace to set yet another record this year.

In 2017, more than 14,000 CVEs were reported, affecting a vast range of devices, systems and applications. So far in 2018, more than 12,000 CVEs have been reported, and if that pace continues, we should move past last year’s record number in the next two months.

Continue reading “Vulnerability management for Internet of Things and embedded systems” »

Laying down the law on IoT security

Laying down the law on IoT security

IoT device security vaulted into the public consciousness in recent years. Media coverage of successful attacks against IoT devices and supporting systems, botnets powered by compromised devices, and a range of other security issues have raised public concern.

But now California is on the verge of enacting the first actual law in the US to mandate IoT device security.

Unfortunately, according to some in the industry, the bill now awaiting the governor’s signature will do little in its present form to improve the security of IoT, or the companies deploying it, or the people using it.

Continue reading “Laying down the law on IoT security” »

Security at IoT scale

Security at IoT scale

It often helps to look at cybersecurity from the attacker’s point of view.

This approach, in fact, is the foundation of common techniques for penetration testing. That’s when “white hat” hackers will put a company’s IT systems through a range of attacks, looking for security vulnerability issues and defense gaps.

So when we consider Internet of Things device security and the defenses that protect an enterprise’s IoT deployments, it’s important to adopt the mindset of an attacker.

What’s an attacker looking for when they are prepping IoT attacks?

Continue reading “Security at IoT scale” »