Jump to content

Search the Community

Showing results for tags 'security'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • IoT Community Forum
    • IoT Engineering
    • IoT Industry News
    • Community Agenda


  • Knowledge Notes
  • Case Studies
  • Announcements


  • Wiki Index


  • Technology Vendors
  • Consultants
  • Research Organisations
    • Universities
    • Government Agencies


  • IoT intellectual property strategy
  • Hook, line and blog
  • Productivity-focused IoT and M2M
  • IoT Thoughts and the Dawn of new Era
  • Making IoT Connectivity Great


  • EA’s IoT Community Activities
  • Other IoT Events
  • Organising Committee Meetings

Found 10 results

  1. Zigbee vulnerabilities

    This post documents a recent paper detailing the security holes in the Zigbee Light Link protocol and uses a hack against Philips Hue light bulbs. It aims to show how the security problems in the Hue bulbs plus the Zigbee Light Link vulnerabilities could lead to bricking bulbs or even jamming Wi-Fi networks on the 2.4 GHz band. https://blog.acolyer.org/2017/06/22/iot-goes-nuclear-creating-a-zigbee-chain-reaction/
  2. Customer Identity Summit Live 2017

    Learn the latest developments on Privacy & Consent, Customer Experience and the IoT. Hear the HSBC Case Study: Customer Identity Management – Democratised and Commoditised Watch the Alexa Demo featuring biometrics thought leaders Daon Interact with the panelists as they discuss the Evolving Role of Privacy in Digital Transformation Network with other business leaders and digital identity experts across this fast moving industry These global summit series bring together visionary analysts, executives, technical experts, thought leaders and other identity professionals to share their digital transformation knowledge and experience. Details and Registration here.
  3. Shodan

    Shodan a search engine specifically designed for the Internet of things. It allows the user to find specific types of things connected to the internet using a variety of filters. This is enabled by storing the meta-data that the IoT devices broadcast. Shodan allows user to determine all parts of your network that are accessible from the internet, categorise the things into types, show what devices are broadcasting using particular SCADA protocols (such as Modbus, S7, DNP2, Fox, BACnet, Ethernet/IP, GE-SRTP, HART and PCWorx) and show where they are being used geographically. Website: https://www.shodan.io/
  4. Spiral Systems

    "Spiral Systems conceive, design, build, test and introduce into service systems that meet customer needs, comply with safety and security regulations and are highly maintainable." Website: http://www.spiralsystems.com.au/
  5. IoT Secuirty

    Hi all, With recent attention in the media, along with the innate obligation as engineers to develop and deliver safe and secure products, cybersecurity in the IoT is a massive topic. Not only is it wide it is deep too with the landscape constantly changing as hackers adapt and find new exploits. I really enjoy the couple of webinars on the topic so far, which can be found in past webinar recordings here: Introduction to IOT Security and Further security approaches Therefore, I thought it best to share the following article from the IEEE I read this morning on the topic. Wanted: Smart Public Policy for Internet of Things Security
  6. Strategic principles for securing IOT

    The U.S. Department of Homeland Security’s have recently released a report called Strategic Principles for Securing the Internet of Things (IoT). This includes reference to the Industrial Internet Consortium's own security framework.
  7. until
    Connected/Smart transport systems encompass a broad range of vehicle and embedded transport systems to manage complexity, optimise performance, and ensure safety of vehicles, passengers and users of the transport system. In practical terms this means autonomous vehicles, roadside sensors and an interconnected system encompassing transit systems, ticketing and rail. Cybersecurity issues in this connected transport system pose a threat to the safety and efficient running are amongst the major concerns of Government and policy bodies. IoTSec Australia is hosting the third of its IoT Cyber Forum series with the intent to raise awareness and promote secure practices in the IoT ecosystem. Come and hear industry experts on connected transport and autonomous vehicles discuss the current and future state of connected transport systems. A security panel will then hold an interactive session answering questions on security for vehicles, embedded systems and control system backend. Date: 2nd December 2016 Time: 8.00am arrival for an 8.30am - 10.30am session Venue: BDO, Level 10/12 Creek Street, Brisbane RSVP: info@iotsec.net.au Speakers: Miranda Blogg: Director (Connected and Automated Vehicles), Department of Transport and Main Roads Dr Andry Rakotonirainy: Deputy Director, Centre for Accident Research & Road Safety, Queensland University of Technology Jamie Smith: Connected Transport Lead, Telstra Security expert panel: TBA Regards, IoTSec Australia www.iotsec.net.au
  8. There a numerous media reports circulating about a denial of service attack, launched from up to 1 million IOT devices, that was so large it apparently overwhelmed the security company charged with defending the site. Use a search engine with keywords Akamai and denial of service and you will find the details. Note, we cant provide direct links as this breaches copyright. Akamai has nothing on its website, so the media reports at this stage are allegations only.
  9. Security approaches

    Recording: This event has now passed. You can purchase the recording here. Title: Picking locks with a blowtorch – IT Security in age of the IOT Presenter: Michael O'Flaherty, Security Consultant, UXC Saltbush Description: Applying an IT Security approach to the Internet of Things (IOT) is akin to picking a lock with a blowtorch. The approach is not fit for purpose and will ultimately end in frustration, burnt hands and very little of the lock’s function remaining. The foundation for good IoT security is recognising the gaps between traditional ICT security and the IoT, and knowing why the approach is different. IT Security is getting pretty good at applying security frameworks and methodologies to corporate IT functions. Unfortunately, the same cannot be said for IT Security's approach to the adoption of the IoT. An IT security manager's head will generally spin when confronted with the IoT and its inability to fit nicely within the mold of traditional IT security. In this talk, security consultant Michael O'Flaherty will explain the fundamental gaps between IT and IoT Security approaches and show you three ways to provide the layers of security that more appropriately accommodate the unique service offering that is the IoT. What you will learn: The difference between corporate and IOT security Three ways to provide layers of security About the presenter: Michael has spent over 20 years casting a sceptical eye over 'good solutions' with the perspective of making them better in Australia and overseas. As a IT Security Consultant he spends most of his time giving risk advice surrounding the myriad contemporary technology being deployed at client sites (some of it is taken). When: 12 midday AEST (Sydney) on 25 October 2016. The presentation will last 30 minutes followed by question time. Where: The presentation is by webinar. After registering you will be sent details of how to logon. Cost: This presentation is free to members of Engineers Australia (EA), the Australian Computer Society (ACS), the Institution of Engineering and Technology (IET) and IEEE. Just provide your membership number during registration for the event. The cost for non-members is $30. How to register: Please register on the Engineers Australia event system. Note, to register you need to have a free EA ID which you can get on the first screen of the registration page. Take note of your ID number for future events.
  10. Security for IoT

    Could we add the topic of security to our list of potential Webinar subjects please. IoT devices are often remotely located, sending back data of potential importance to the end user. There may be concerns that this data could be either lost or intercepted. Or that someone might attempt to hack into an IoT device. E.g. a device that monitors a car parking space might be ready to raise the alarm that you have been parked too long. Who wouldn't want an App to override this? What is recommended good practice to ensure secure and robust communications. At the event last Thursday (8th September) at Chatswood on "IoT Deployment in Australia" one of the questions was on security. Unfortunately, not the speakers area of expertise. Best regards Steve Lewis