Internet of Threats: How hackers make their way into our homes and how manufacturers can stop them
When we think of hacking, the image that usually comes to mind is that of hoodie-wearing masterminds entering the holiest and most secure places on the web: the Pentagon, NASA, financial institutes, Iran’s nuclear program or election results. But...
What does the future hold for Home IoT device companies? Thoughts about cybersecurity threats
First of all, I have nothing against Security by Design. Let’s sort this one right out the gate! My point in this article is that Security by Design on its own is not enough. That’s something I can safely stand...
“Hey Google, can you please hack Alexa”?
Smart home assistants are pretty popular these days, and for a good reason - they are time-saving, convenient, fun and addictive! Working in the cybersecurity industry and being familiar with the security risks that rely on IoT endpoint devices, I...
Introducing SHEL – Smart Home environment Lab for IoT companies – Gem inside!
As our journey in the home IoT cybersecurity world evolved, we realized that it is mandatory for us to create a simulation environment for a typical smart home, as most of our clients’ devices reside in such environments. Our idea...
P2P Hole punching in Home IoT – A best UX or a built in security vulnerability?
There’s a punch, and then there’s P2P Hole punching… It’s no news that many home IoT devices are constantly sending data to their corresponding mobile apps, especially when it comes to video and audio. Consumers are therefore looking for devices...
A Fresh View on Home Network (in)Security
Let’s talk about home network security. There’s a lot of confusion surrounding the security of the private home LAN. In this post, we will shatter the security myth and demonstrate how IoT devices are easily hackable even when they reside in...
The Illusion of Security By Design
Security by design, an approach that seeks to make systems free from vulnerabilities during product design, is gaining popularity in the IoT world. Setting a strong security foundation and designing for privacy is necessary. However, this is just the first step...