Guest Post: Cybercriminals now see home routers as gateways to corporate networks, and companies as potential attack vectors.
Guest Post: A single Internet connected device employing EUI-64 can enable tracking of other devices, even if all other devices use privacy mechanisms such as IPv6 privacy extensions and the ISP employs prefix rotation.
Guest Post: Study shows that most consumer IoT devices rely on TLS 1.2; few have upgraded to TLS 1.3.
Guest Post: The Helium Network is quickly becoming a viable, decentralized IoT network with more than 400,000 hotspots.
In 2021, Geoff delivered several insightful posts, here are three of the best.
Guest Post: Emerging IoT threats are quickly evolving and adapting to current defences.
Guest Post: Study provides first analysis into the operations of a real-world IP Exchange Provider with a large platform serving customers in 19 economies.
Opinion: Who will take responsibility for managing security vulnerabilities in Internet-connected devices?
Guest Post: Most WiFi devices are designed to acknowledge all packets received — this poses security risks.
Guest Post: How can we identify and locate IoT devices in networks to mitigate exposure to large-scale attacks?