Remove Computer and Electronics Remove Encryption Remove Examples Remove Manufacturing
article thumbnail

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found. A Webcam made by HiChip that includes the iLnkP2P software.

IoT 262
article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality. Co-ordination is key.

IoT 77
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

3 Ways to Protect Smart Devices from Criminal Exploits madhav Thu, 07/20/2023 - 07:28 When people think of home or business security, they are usually worried about protecting against a physical breaking in via a window or door and a burglar stealing valuables such as jewelry, cash, electronics, and equipment.

article thumbnail

Enhance your security posture by detecting risks on authenticator devices

Thales Cloud Protection & Licensing

In ongoing discussions with our customers, we received feedback from those who are concerned about letting end users authenticate to sensitive IT resources using a device that could be compromised - for example a jailbroken or rooted device. If a device is jailbroken or rooted we may preferably want to block the authenticator app.

article thumbnail

Enhance your security posture by detecting risks on authenticator devices

Thales Cloud Protection & Licensing

In ongoing discussions with our customers, we received feedback from those who are concerned about letting end users authenticate to sensitive IT resources using a device that could be compromised - for example a jailbroken or rooted device. If a device is jailbroken or rooted we may preferably want to block the authenticator app.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

A DSP is an information society service that is an online marketplace, an online search engine or a cloud computing service. The deployment models of cloud computing should include private, community, public and hybrid cloud and be interpreted in accordance with the ISO/IEC 17788:2014 standard. social networking services platforms.

article thumbnail

AUSTRALIA: Assistance and Access Act, December 2018 – Holy grail of uncertainty created by new rushed-in data encryption laws

DLA Piper Privacy Matters

Of particular public concern is the issue raised that law enforcement agencies will be allowed to directly intercept messages sent through end-to-end encryption under technical assistance and capability notices, affecting tools used by companies such as Google, WhatsApp, Apple iMessage, and Telegram (who have all publicly denounced the Act).