Remove the-internet-of-things-is-a-complete-mess-and-how-to-fix-it
article thumbnail

The Internet of Things is a Complete Mess (and how to Fix it)

Troy Hunt

Plus, it's definitely added to our lives in terms of the things it enables us to do; see them in part 5 of my IoT unravelled blog series. But it also remains a complete mess and I want to demonstrate why based on some recent experiences: Let's say you want an IoT light. With a different app.

IoT 143
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. I've been directly involved in the discovery or disclosure of a heap of these and indeed, security is normally the thing I most commonly write about. Let's dive into it.

IoT 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

Fuzzing makes it possible to locate vulnerabilities even in “safe” environments like Erlang, a language designed for high availability and robust services. The flaw was discovered and reported directly to the administrators of Log4j, widely used open source tool, who then patched it. The trouble is, details of this leaked prematurely.

article thumbnail

Padlocks, Phishing and Privacy; The Value Proposition of a VPN

Troy Hunt

I want a "secure by default" internet with all the things encrypted all the time such that people can move freely between networks without ever needing to care about who manages them or what they're doing with them. I mean what's the remaining gap? In the end I broke it down into 3 Ps: padlocks, phishing and privacy.

Privacy 143
article thumbnail

Letter to 20 years ago

Imperial Violet

The topics are going to be quite specific and if you weren't paying attention to the computing industry in the year 2000 I’m not sure how much of it will make sense. Terminals are still emulating a fancy VT-100 and sometimes they get messed up and need a reset. No fixes there. It is very much a letter to me! Yep, that's cool.

Paper 104
article thumbnail

Vulnerability Management as a Service: Top VMaaS Providers

eSecurity Planet

There are 20,000 or more new software and hardware vulnerabilities every year, yet only a few hundred might be actively exploited. It falls to IT security teams to determine where those vulnerabilities lie in their organization and which ones they need to prioritize. That process can be overwhelming. What are the Main Steps Involved in VMaaS?

Cloud 126
article thumbnail

From U2F to passkeys

Imperial Violet

However, it can be challenging to read these standards and understand how it’s meant to fit together. And knowledge of the token is how you prove your identity. (This post is nearing 8 000 words. If you want to throw it onto an ereader there's an EPUB version too.) The beginning: U2F U2F stands for “Universal Second Factor”.