We never run short of news on the vulnerabilities of IoT infrastructures. This week, IoT World Today has published an article on how critical infrastructures around the world are now more vulnerable than ever, due to the surge in attacks on the IoT technology that powers them. Critical elements of…

Anna Marton, Safepay SystemsAugust 13, 2021
The operate and monitor phases are the final phases of the SDLC. They are collectively referred to as the maintenance phase and they are commonly thought of as a rather passive part of the process, but nothing could be further from the truth. This is where all the action is.…

Eric Estes and David Kovacs, ATOSAugust 5, 2021
Nozomi Networks, a leading provider of OT and IoT security solutions, published its OT/IoT Security Report summarizing its research in ransomware and IoT vulnerabilities of the first half of 2021. The report shares insights about the discovered vulnerabilities of 3 surveillance cameras that use Peer-to-Peer (P2P) functionality to provide access…

Anna Marton, Safepay SystemsJuly 30, 2021
With all the interconnected devices in the world, integrated seamless communication is a must. This always-available access is seemingly at odds with the goal of security. Additionally, the way in which applications are built has changed over time with many companies merging agile techniques with development and operation processes. The…

Eric Estes and David Kovacs, ATOSJuly 22, 2021
Approaching the 1st year anniversary of the IoTAC project, on 16. July 2021 a major part of the regular Technical Committee Meeting of the project was dedicated to the demonstration of proof of concepts and prototypes of the various components of the secure IoTAC architecture. Some basic features of the…

Andras VilmosJuly 19, 2021
After the highly successful EuroCybersec2018 organized by Prof. Erol Gelenbe (IITIS-PAN & Lab I3S, Université Côte d’Azur), whose proceedings with Springer enjoyed over 140,000 downloads, IoTAC will organize the EuroCybersec2021 Workshop in Nice, France, chaired by Prof. Gelenbe with the help of a Program Committee of experts. The deadline for paper…

IoTACJuly 12, 2021
According to current reports like in “A survey of emerging threats in cybersecurity” a large number of security breaches in software systems are due to internal security vulnerabilities. These security risks usually originate in the implementation or in the third-party libraries used. The Open Web Application Security Project (OWASP) regularly…
ETSI has released a first set of seven standards addressing the testing of the IoT MQTT and CoAP protocols, and the foundational security IoT-Profile. The ETSI TS 103 596 series provides an overall test suite structure and catalogue of test purposes for the Constrained Application Protocol (CoAP). The ETSI TS 103 597 series…

Anna Marton, Safepay SystemsJuly 1, 2021
Recent Comments