IoT Security Blog

Articles and Posts on IoT Security, Embedded Systems, and the Internet of Things

Register for the December 15 Webinar on Quantum-Resistant Cryptography for the IoT

2nd webinar in our series – Join us for a technical deep dive of Secure RF’s protocol implementations and performance metrics for low-resource devices. Customer concerns related to IoT security are becoming more prevalent as IoT becomes more mainstream. However, many companies involved in the production of low-resource IoT devices driven by 32-, 16-, and…
Read More

Lightweight Cryptography for Embedded Systems in the IoT

Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems were typically not attached to public networks, and tampering with them was arduous and required specialized software skills. The threat level against them was low to non-existent. But now that embedded systems and processors are…
Read More

IoT Security Hacks With a Common Thread

Security of the Internet of Things (IoT) has been in the news lately, for all the wrong reasons. In addition to the recent DDoS takedown of Dyn, there were various hacking, ransomware and DDoS attacks that caught the attention of the security community. Let’s take a look at some of them: Philips Hue Hack Could…
Read More

SecureRF Offers IoT Embedded Security Development Kit and Demo of Multi-mode Sensor Tag at IDTechEx Show 2016

Going to the IDTechEx show, Nov. 16-17 in Santa Clara, CA? Come to booth O33, where SecureRF will present its latest software and hardware solutions for providing identification, authentication, and data protection for your products in the Internet of Things. Free IoT Embedded Security Development Kit Developers looking for quantum-resistant, low-resource cryptography for their IoT…
Read More

Quantum Computing's Threat to Current Cryptosystems

The computers and communication systems we use today rely on cryptographic systems commonly based on factoring large numbers or finding discrete logarithms. Both these methods are secure because conventional computers lack the sheer computational power needed to break them. For example, a recent factoring for RSA with a long key was RSA-220 (220 decimal digits,…
Read More

SecureRF Offers its IoT Embedded Security Development Kit for the ARM Cortex-M0/M3 at ARM TechCon 2016

If you’re responsible for developing ARM-based IoT products that require security at very low energy levels, be sure to visit us at booth 216, October 26-27, 2016 during Arm TechCon. We’ll be providing developers with our asymmetric, quantum-resistant Security Development Kit, ideally suited for FPGAs, ASICs, SOCs and other low-resource platforms that use ARM Cortex…
Read More
IoT device security enabled DDoS attack on Dyn

Why Dyn Suffered a DDoS Attack and How Consumer IoT Device Security Vulnerabilities can be Addressed

Friday’s hack and DDoS attack on Dyn that brought down portions of the Internet within the US should not be much of a surprise to the cyber security community. For years, manufacturers have developed and sold IoT devices like IP Security Cameras or IP-connected DVR solutions that have baked-in login credentials. Often these credentials are…
Read More

Register for the November 1 IoT Security Webinar

Devices driven by 8- or 16-bit processors don’t have the compute and memory resources to incorporate ECC security with acceptable runtimes and resource allocation, but many still require authentication and/or data protection. It’s a problem that is escalating as IoT and IIoT become mainstream and customer concerns about security issues increases. On Tuesday, November 1,…
Read More

SecureRF CEO to Speak at IIoT University and Offer High-performance Internet of Things Security Solutions for 8- and 16-bit Processors at Sensors Midwest

Sensors driven by 8- or 16-bit processors typically don’t have the compute and memory resources to incorporate ECC authentication and security with acceptable runtimes and resource allocation. It’s a problem that is escalating as IoT and IIoT become mainstream and concerns about security issues increase. What’s a design engineer to do? How to Solve the…
Read More

Top IoT Security Vulnerabilities

As consumers become more familiar with the Internet of Things, they’re opening their eyes to the IoT security threats that come with greater connectivity. And many of the threats that they fear the most are also on the radars of industry professionals. Consumers, according to a recent survey by Vormetric, fear hacking attacks on cars…
Read More

Archives