
Unsecured IoT Devices are Under Attack
We are amid a bit of what can be described as a perfect storm for cybersecurity. As we’ve covered before, the threat landscape is expanding
We are amid a bit of what can be described as a perfect storm for cybersecurity. As we’ve covered before, the threat landscape is expanding
As we have covered before, automotive cybersecurity is increasingly important. While witnessing the rapid expansion of connective tech driving the industry forward, we are also
Spring is finally here, but so is a new software vulnerability with the same name. As HIPAA Journal reports, “Two remote code execution vulnerabilities have
Innovation can be very exciting, but it can also be challenging. The transitional periods that it takes us through often come with some smoothing out
Most advice for proper IoT firmware cybersecurity will mention the need for secure boot or secure data in transit. Let’s look at a side-channel attack
Most advice for proper IoT cybersecurity will mention the need for secure data in transit, aka SSL/TLS or IPsec. Let’s assume great protocol stacks, great
Throughout history, technological booms have ushered in new eras of evolution for us as a society. We’ve gone through transformations in our methods to carry
Firmware Developers Need To Know Quick recap. This is the second post in a long blog series diving into implementing cybersecurity for connected devices. Most
Firmware Developers Need To Know Quick recap. This is the first blog in a long blog series diving into implementing cybersecurity for connected devices. Most
Much like we have seen the capabilities and intricacies of computer systems expand exponentially, the same is occurring in the realm of automotive systems. This
A 19-year old, David Colombo, got thrusted into the spotlight after discovering a potential security issue for Tesla owners running a third-party application, TeslaMate. David
As Assaf Harel wrote for TechCrunch, “The buzz about 19-year-old Tesla hacker David Colombo is well deserved.” While his actions didn’t consist of direct steering
We no longer compare offerings to competing solutions but to the “app experience.” We know it when we see it. The app experience just works,
2021 was quite a year for cybersecurity. With a string of eye-opening attacks that demonstrated the vulnerabilities associated with public and private sectors and impacting
Minecraft, the popular video game first released in 2009, has grown a cult following over the past decade. The ultimate goal of Minecraft is to
Some time ago, I stumbled upon the term “Heisenbug.” What a perfect name for a bug! If you’re a coder, be forewarned this article may
With half of 2019 gone already (can you believe it?), in our opinion it’s an opportune time to reflect on the state of IoT security.
If you use Yocto as your tooling and build environment then you know the power and flexibility it brings to defining and creating runnable embedded