Tag

IoT security

0 views collected around this technical thread.

360 Tech Engineering
360 Tech Engineering
Apr 21, 2023 · Information Security

FirmAE: Automated Firmware Emulation and Vulnerability Analysis – Installation, Usage, and Zyxel Router Case Study

This article introduces FirmAE, an automated framework for firmware emulation and vulnerability analysis, details its installation and usage steps on Ubuntu, and presents a comprehensive reverse‑engineering case study of a Zyxel router firmware to illustrate troubleshooting and manual analysis techniques.

EmulationFirmAEIoT security
0 likes · 8 min read
FirmAE: Automated Firmware Emulation and Vulnerability Analysis – Installation, Usage, and Zyxel Router Case Study
Architects' Tech Alliance
Architects' Tech Alliance
Apr 6, 2023 · Information Security

Key Chip‑Level Security Technologies for the Internet of Things

The article explains the security challenges of IoT deployments and describes chip‑level protection methods such as TPM, Secure Boot, Trusted Execution Environments, and hardware‑based trusted computing mechanisms like ARM TrustZone, Intel TXT, and AMD PSP, highlighting their roles in building a trustworthy IoT architecture.

ARM TrustZoneIoT securitySecure Boot
0 likes · 10 min read
Key Chip‑Level Security Technologies for the Internet of Things
Architects Research Society
Architects Research Society
Apr 10, 2021 · Information Security

Unclear Responsibility and Growing Risks in IoT and Mobile Application Security

The article highlights the rapid expansion of IoT and mobile applications, the escalating security concerns, and the lack of clear ownership for protecting these platforms, citing survey data that shows widespread uncertainty and insufficient protective measures across enterprises.

IoT securityMobile Securityenterprise risk
0 likes · 5 min read
Unclear Responsibility and Growing Risks in IoT and Mobile Application Security
Tencent Cloud Developer
Tencent Cloud Developer
Jul 23, 2020 · Information Security

IoT Security: Challenges, Differences from Traditional Internet Security, and Capability Building

As IoT devices proliferate across industries, their fragmented, resource‑constrained nature and continuous operation create security challenges distinct from traditional Internet security, prompting the need for specialized authentication, lightweight TLS, secure chips, trusted execution environments, software hardening, and emerging standards to protect the ecosystem.

IoT securityTLSindustry standards
0 likes · 14 min read
IoT Security: Challenges, Differences from Traditional Internet Security, and Capability Building
Architects Research Society
Architects Research Society
May 1, 2020 · Information Security

Securing IoT Devices: The Critical Role of API Management and Security Strategies

This article explains how comprehensive API lifecycle management, robust authentication, version control, and integrated security policies are essential for protecting IoT devices and customer data from increasingly common API‑related vulnerabilities.

API ManagementBlockchainDevice Protection
0 likes · 6 min read
Securing IoT Devices: The Critical Role of API Management and Security Strategies
Architects Research Society
Architects Research Society
Sep 21, 2019 · Information Security

12 Best Cybersecurity Practices for 2019

This article outlines twelve essential cybersecurity practices for 2019, covering biometric authentication, tiered security policies, risk‑based approaches, regular backups, IoT security, multi‑factor authentication, password management, least‑privilege principles, privileged‑user monitoring, third‑party access control, phishing awareness, and employee training.

IoT securityMFARisk Assessment
0 likes · 18 min read
12 Best Cybersecurity Practices for 2019
JD Tech
JD Tech
Oct 26, 2018 · Information Security

IoT Security Insights from GeekPwn2018: OBD‑2 Vulnerabilities and Attack Scenarios

The article reports on the GeekPwn2018 security competition in Shanghai, highlighting JD security teams' IoT research, explaining how OBD‑2 based car insurance devices can be hijacked, and stressing the urgent need for stronger IoT protection against physical‑layer attacks.

AutomotiveIoT securityJD Security
0 likes · 6 min read
IoT Security Insights from GeekPwn2018: OBD‑2 Vulnerabilities and Attack Scenarios
Architects Research Society
Architects Research Society
Jun 6, 2017 · Information Security

Embedded vs. Bolt‑On Security in the Internet of Things: Risks and Mitigation Strategies

The article examines how built‑in (embedded) security differs from bolt‑on security in IoT devices, outlines real‑world attack scenarios—including physical and network exploits—and recommends foundational security designs to protect connected sensors, actuators, and smart environments.

IoT securitybolt-on securityembedded security
0 likes · 8 min read
Embedded vs. Bolt‑On Security in the Internet of Things: Risks and Mitigation Strategies
Architects Research Society
Architects Research Society
May 11, 2017 · Information Security

Challenges and Responsibility Gaps in IoT and Mobile Security

The article examines the rapid rise of IoT and mobile applications in enterprises, highlights widespread security concerns, identifies unclear responsibility for protection, and presents survey findings that reveal organizational uncertainty and pressure on developers that exacerbate security risks.

IoT securityMobile SecurityPonemon study
0 likes · 5 min read
Challenges and Responsibility Gaps in IoT and Mobile Security
Architects Research Society
Architects Research Society
May 9, 2017 · Information Security

Microsoft’s Sopris Project: A New Approach to Secure IoT Hardware and Communication

Microsoft’s Sopris project introduces a hardware‑rooted, renewable security framework for IoT devices, combining trusted computing principles, Azure IoT services, and automated key refresh to protect firmware, software, and communications while enabling large‑scale device management and bug‑bounty validation.

Azure IoTHardware TrustIoT security
0 likes · 9 min read
Microsoft’s Sopris Project: A New Approach to Secure IoT Hardware and Communication
Architects Research Society
Architects Research Society
Apr 30, 2017 · Information Security

Key Insights from RSA 2016: Emerging IoT Security Trends and Predictions

The 2016 RSA Conference in San Francisco highlighted IoT as the top security trend, with experts discussing the shift from observation to solutions, the rise of PKI, chip‑to‑cloud protection, regulatory impacts, ransomware threats, and the potential of blockchain to manage massive IoT data challenges.

BlockchainConnected DevicesCyber Threat Intelligence
0 likes · 9 min read
Key Insights from RSA 2016: Emerging IoT Security Trends and Predictions