With analysis and research by Stephen Hilt (Independent Researcher) Even as attacks on SCADA devices has become more public, devices are constantly being reported as Internet-facing and thus, vulnerable to attacks. Very little security is implemented on these devices, making them perfect targets of opportunity. Recently, Internet-facing gas station pumps have gained some attention, when…
Read MoreHearing about vulnerabilities in your car’s operating system might seem strange. But it’s now something we all need to get used to. Last January 30, several security loopholes in BMW’s ConnectedDrive system, that could allow potential thieves to unlock doors and track car data using a mobile device, as the security gap may affect the transmission path via the…
Read MoreHome surveillance/security cameras have been available for quite some time, and can be used to keep track of one’s home, children, pets, or business. These devices are, in some ways, the first exposure of people to the Internet of Things. For most people, home surveillance means setting up a camera and using the Internet to…
Read MoreSecurity is one of the top concerns when consumers consider buying smart devices. With cybercrime making the headlines every day, one has to think: is this smart device vulnerable to cyber attacks? Are these technologies secure enough for us to rely on them in our everyday lives? A good example of a technology that we need…
Read MoreI prefer using the phrase “Internet of Everything” when discussing what most people call the Internet of Things because in many ways, the latter term isn’t enough. What makes the Internet of Everything so powerful is the data about you and me that these devices can gather. Consider how these devices actually work. They almost…
Read More