Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • IoT Community Forum
    • IoT Engineering
    • IoT Industry News
    • Community Agenda

Product Groups

  • 10 Things you should know about the IoT

Categories

  • Knowledge Notes
  • Case Studies
  • Announcements

Categories

  • Technology Vendors
  • Consultants
  • Research Organisations
    • Universities
    • Government Agencies

Blogs

  • IoT intellectual property strategy
  • Hook, line and blog
  • Productivity-focused IoT and M2M
  • IoT Thoughts and the Dawn of new Era
  • Making IoT Connectivity Great
  • Microsoft Cloud Workshop: IoT on the Edge
  • Waleed Ahmed

Calendars

  • EA’s IoT Community Activities
  • Other IoT Events
  • Organising Committee Meetings

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Name


Organisation Membership


Industry


Role

Found 12 results

  1. View the recording: This webinar has passed. Members of Engineers Australia can view the recording free on MyPortal. Simply logon and navigate to Technologies > Security. _______________________________________________________________________________________________ Presenter: Michael O'Flaherty, Security Consultant, UXC Saltbush Description: Applying an IT Security approach to the Internet of Things (IOT) is akin to picking a lock with a blowtorch. The approach is not fit for purpose and will ultimately end in frustration, burnt hands and very little of the lock’s func
  2. Casino hacked via a thermometer in a lobby aquarium – what a nice story. Sad, there is no technical details in the article. http://www.businessinsider.de/hackers-stole-a-casinos-database-through-a-thermometer-in-the-lobby-fish-tank-2018-4?r=UK&IR=T
  3. Introduction Replacing prisons with high tech systems capable of detaining prisoners in their own homes and the use of artificial intelligence to predict and prevent imminent offenses may sound the stuff of science fiction, but rapid advances in technology surrounding IoT makes such a vision a possibility worth discussing. A system that effectively turns prisoners into internet nodes using IoT wearables with the ability to deliver electric shocks would have significant social impact. These ramifications need to be taken into account along with engineering design and legal considerati
  4. This post documents a recent paper detailing the security holes in the Zigbee Light Link protocol and uses a hack against Philips Hue light bulbs. It aims to show how the security problems in the Hue bulbs plus the Zigbee Light Link vulnerabilities could lead to bricking bulbs or even jamming Wi-Fi networks on the 2.4 GHz band. https://blog.acolyer.org/2017/06/22/iot-goes-nuclear-creating-a-zigbee-chain-reaction/
  5. until
    Learn the latest developments on Privacy & Consent, Customer Experience and the IoT. Hear the HSBC Case Study: Customer Identity Management – Democratised and Commoditised Watch the Alexa Demo featuring biometrics thought leaders Daon Interact with the panelists as they discuss the Evolving Role of Privacy in Digital Transformation Network with other business leaders and digital identity experts across this fast moving industry These global summit series bring together visionary analysts, executives, technical experts, thought leaders and other identity professi
  6. Tim Kannegieter

    Shodan

    Shodan a search engine specifically designed for the Internet of things. It allows the user to find specific types of things connected to the internet using a variety of filters. This is enabled by storing the meta-data that the IoT devices broadcast. Shodan allows user to determine all parts of your network that are accessible from the internet, categorise the things into types, show what devices are broadcasting using particular SCADA protocols (such as Modbus, S7, DNP2, Fox, BACnet, Ethernet/IP, GE-SRTP, HART and PCWorx) and show where they are being used geographically. Website: http
  7. Tim Kannegieter

    Spiral Systems

    "Spiral Systems conceive, design, build, test and introduce into service systems that meet customer needs, comply with safety and security regulations and are highly maintainable." Website: http://www.spiralsystems.com.au/
  8. Hi all, With recent attention in the media, along with the innate obligation as engineers to develop and deliver safe and secure products, cybersecurity in the IoT is a massive topic. Not only is it wide it is deep too with the landscape constantly changing as hackers adapt and find new exploits. I really enjoy the couple of webinars on the topic so far, which can be found in past webinar recordings here: Introduction to IOT Security and Further security approaches Therefore, I thought it best to share the following article from the IEEE I read this morning on the topic. Wa
  9. The U.S. Department of Homeland Security’s have recently released a report called Strategic Principles for Securing the Internet of Things (IoT). This includes reference to the Industrial Internet Consortium's own security framework.
  10. until
    Connected/Smart transport systems encompass a broad range of vehicle and embedded transport systems to manage complexity, optimise performance, and ensure safety of vehicles, passengers and users of the transport system. In practical terms this means autonomous vehicles, roadside sensors and an interconnected system encompassing transit systems, ticketing and rail. Cybersecurity issues in this connected transport system pose a threat to the safety and efficient running are amongst the major concerns of Government and policy bodies. IoTSec Australia is hosting the third of its IoT Cyber F
  11. There a numerous media reports circulating about a denial of service attack, launched from up to 1 million IOT devices, that was so large it apparently overwhelmed the security company charged with defending the site. Use a search engine with keywords Akamai and denial of service and you will find the details. Note, we cant provide direct links as this breaches copyright. Akamai has nothing on its website, so the media reports at this stage are allegations only.
  12. Could we add the topic of security to our list of potential Webinar subjects please. IoT devices are often remotely located, sending back data of potential importance to the end user. There may be concerns that this data could be either lost or intercepted. Or that someone might attempt to hack into an IoT device. E.g. a device that monitors a car parking space might be ready to raise the alarm that you have been parked too long. Who wouldn't want an App to override this? What is recommended good practice to ensure secure and robust communications. At the event last Thursday (8
×
×
  • Create New...