“Hey Google, can you please hack Alexa”?
Smart home assistants are pretty popular these days, and for a good reason - they are time-saving, convenient, fun and addictive! Working in the cybersecurity industry and being familiar with the security risks that rely on IoT endpoint devices, I...
Introducing SHEL – Smart Home environment Lab for IoT companies – Gem inside!
As our journey in the home IoT cybersecurity world evolved, we realized that it is mandatory for us to create a simulation environment for a typical smart home, as most of our clients’ devices reside in such environments. Our idea...
P2P Hole punching in Home IoT – A best UX or a built in security vulnerability?
There’s a punch, and then there’s P2P Hole punching… It’s no news that many home IoT devices are constantly sending data to their corresponding mobile apps, especially when it comes to video and audio. Consumers are therefore looking for devices...
A Fresh View on Home Network (in)Security
Let’s talk about home network security. There’s a lot of confusion surrounding the security of the private home LAN. In this post, we will shatter the security myth and demonstrate how IoT devices are easily hackable even when they reside in...
The Illusion of Security By Design
Security by design, an approach that seeks to make systems free from vulnerabilities during product design, is gaining popularity in the IoT world. Setting a strong security foundation and designing for privacy is necessary. However, this is just the first step...