Remove Conference Remove IoT Remove Manufacturing Remove Mining
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. As with the rest of the IoT landscape, there's a lot of scope for improvement here and also just like the other IoT posts, it gets very complex for normal people very quickly.

IoT 143
article thumbnail

5 IoT Security Predictions for 2019

Security Affairs

2018 was the year of the Internet of Things (IoT), massive attacks and various botnets hit smart devices, These are 5 IoT Security Predictions for 2019. IoT Attacks in 2018. Do the increased attacks mean the industry is becoming accustomed to IoT cyber attacks? Three IoT Attack Avenues for 2019.

IoT 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

The exponential growth in content is fueled by a plethora of connected devices, colloquially called “Internet of Things (IoT),” from cell phones, mobiles, and wearable technologies, to sensors in homes, appliances, cars, and so on. Another example is real-time traffic and public transit data captured by the IoT. Data Analytics.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

And, there’s thirty more villages including Girls Hack Village, the Voting Machine Hacking village, the IoT Village, and the Bio Hacking village. So in this episode, I'm going to share some of the conversations I've had with leaders of some of those more established villages over the last 50 episodes of the hacker mine.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

They discuss how software and IoT companies can avoid becoming the next Black Mirror episode and share resources that can help survivors (and those who want to help them) deal with the technology issues that can be associated with technologically facilitated abuse. But what about IoT devices? Both involve technology.

article thumbnail

Jason R. Baron of Drinker Biddle & Reath LLP: eDiscovery Trends 2018

eDiscovery Daily

So, there’s the question of liability, i.e., whether the software developer or manufacturer are held to a standard of strict liability, and what kind of ethical considerations are involved. Where are mining operations? Who’s doing the mining? What is a blockchain’s future when all the tokens have been mined?

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Vamosi: But as someone who wrote a book questioning the security of our mass produced IoT devices, I wonder why no one bothered to test and certify these devices before they were installed? Yeah, there are tracks at conferences, but it hasn't yet exploded into the mainstream. And I remember asking questions, who were the manufacturers?