News & Updates

View All
Blog
blog

9 IoT Cybersecurity Leaders & Influencers to Follow

June 17, 2019 by Sharon Mirsky

Home IoT is a relatively young industry, and one might think that it’s too early to declare strong expertise in this field. But young industries are often built upon decades of research and are in great need of pioneers to...

blog

Wish Google Cloud IoT Core Had an Emulator? We’ve got you covered

June 03, 2019 by Orr Chen

The Google Cloud IoT core is a fully managed service that connects, manages, and ingests data from globally dispersed devices. But it does not come with a built-in emulator, and we are not sure why. An emulator, as you probably...

blog

Internet of Threats: How hackers make their way into our homes and how manufacturers can stop them

May 14, 2019 by Sharon Mirsky

  When we think of hacking, the image that usually comes to mind is that of hoodie-wearing masterminds entering the holiest and most secure places on the web: the Pentagon, NASA, financial institutes, Iran’s nuclear program or election results. But...

blog

What does the future hold for Home IoT device companies? Thoughts about cybersecurity threats

April 15, 2019 by Sharon Mirsky

First of all, I have nothing against Security by Design. Let’s sort this one right out the gate! My point in this article is that Security by Design on its own is not enough. That’s something I can safely stand...

blog

“Hey Google, can you please hack Alexa”?

April 04, 2019 by Sharon Mirsky

Smart home assistants are pretty popular these days, and for a good reason - they are time-saving, convenient, fun and addictive! Working in the cybersecurity industry and being familiar with the security risks that rely on IoT endpoint devices, I...

blog

Introducing SHEL – Smart Home environment Lab for IoT companies – Gem inside!

March 20, 2019 by Orr Chen

As our journey in the home IoT cybersecurity world evolved, we realized that it is mandatory for us to create a simulation environment for a typical smart home, as most of our clients’ devices reside in such environments. Our idea...

blog

P2P Hole punching in Home IoT – A best UX or build in security vulnerability?

March 03, 2019 by Shaked Ilan

There’s a punch, and then there’s P2P Hole punching… It’s no news that many home IoT devices are constantly sending data to their corresponding mobile apps, especially when it comes to video and audio. Consumers are therefore looking for devices...

blog

A Fresh View on Home Network (in)Security

February 20, 2019 by Shir Rinot

Let’s talk about home network security. There’s a lot of confusion surrounding the security of the private home LAN. In this post, we will shatter the security myth and demonstrate how IoT devices are easily hackable even when they reside in...

blog

The Illusion of Security By Design

February 07, 2019 by Orr Chen

Security by design, an approach that seeks to make systems free from vulnerabilities during product design, is gaining popularity in the IoT world. Setting a strong security foundation and designing for privacy is necessary. However, this is just the first step...

blog

The Story of Firedome

January 21, 2019 by Moti Shkolnik

We are Firedome, and earlier this year we embarked on a mission to spread security across the home IoT industry. Over the last few years, this industry has been rapidly assimilated into our lives with very little security in mind....