Opinion: Who will take responsibility for managing security vulnerabilities in Internet-connected devices?
Guest Post: Most WiFi devices are designed to acknowledge all packets received — this poses security risks.
Guest Post: How can we identify and locate IoT devices in networks to mitigate exposure to large-scale attacks?
Beating IoT botnets means spotting them first — graph theory research can help.
Guest Post: How regularly are IoT devices, such as smart light bulbs, accessing your network?
Guest Post: Do our Internet-of-Things (IoT) devices at home expose private information unexpectedly?
Guest Post: Researchers have developed a secure IoT architecture using features supported by Software Defined Networks.
History has a habit of repeating itself, often for the wrong reasons.
Are our security and privacy standards keeping pace with the progression and use of technology?
Guest Post: No matter how hard we try, IoT devices will always have some vulnerability. But that doesn’t mean we are defenceless.