Protecting IoT Devices with PUF Technology

Protecting IoT Devices with PUF Technology

More and more IC manufacturers are exploring a chip-level security technology to protect data, known as Physically Unclonable Function (PUF). Although the chip manufacturing process is very precise, there are still slight differences in each circuit on the chip, and this technology takes advantage of that difference. PUF uses these minute variations to generate a … Read more

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker, produced by Rapid7, is a network scanning tool for default password credentials of IoT devices, capable of scanning specific IoT devices to determine whether they are using default or factory-set password credentials. Tool Introduction The cause of the large-scale network outage in the United States was investigated to be malware exploiting default password credentials … Read more

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker: A Tool for Scanning Default Passwords of IoT Devices

IoTSeeker, developed by Rapid7, is a tool for scanning default password credentials of IoT devices. It can scan specific IoT devices to determine if they are using default or factory-set passwords. Tool Introduction The recent large-scale network disruption in the United States was investigated to be caused by malware exploiting default password credentials of IoT … Read more

4 Key Elements for Successful IoT Device Integration

4 Key Elements for Successful IoT Device Integration

Integrating IoT devices can be a complex process. Administrators must always operate on various devices and ensure secure connections. To install IoT devices, administrators must connect them to the local network and the internet so that the devices can perform the intended tasks. Next, they must connect the devices to the specific applications that they … Read more

Silent Threats Inside IoT Devices

Silent Threats Inside IoT Devices

As more and more smart devices are installed in homes, all these cheap connected devices bring new security issues to the entire family and society. This problem is becoming increasingly complex as companies are significantly increasing the number of sensors and remote monitors used to manage office environments and detailed manufacturing processes in factories. At … Read more

Handling a Server Breach: A Step-by-Step Guide

Handling a Server Breach: A Step-by-Step Guide

In the following text, locking files and directories refers to adding certain attributes to files and directories, such as read-only. chattr +ia 1. Symptoms of Server Breach Recently, a friend’s server (he set up a website himself) seemed to have been breached, with symptoms including: the server’s CPU resources being at 100% for an extended … Read more

2020 IoT Terminal Security White Paper

2020 IoT Terminal Security White Paper

Click the blue text to follow us 1. Introduction In the era of consumer internet, the value of the Internet of Things (IoT) itself has not been fully explored. With the advent of the 5G era, the IoT field has ushered in new development opportunities. The 5G communication technology defines three major application scenarios: eMBB, … Read more

Overview of Automotive Projects and Embedded Systems Based on Xen

Overview of Automotive Projects and Embedded Systems Based on Xen

Disclaimer: The content and images of this article are reprinted from BC-AUTO to the English network. 2019 Global Intelligent Automotive Cybersecurity and Information Security Industry Research Report 2019 China Onboard Gateway Industry Research Report 2019 Global and China Onboard Ultrasonic Radar Industry Research Report 2019 Global and China Surround View ADAS Industry Research Report 2019 … Read more

Using Self-Signed Certificates with QT5 for Accessing Cloud HTTPS REST API Services

Using Self-Signed Certificates with QT5 for Accessing Cloud HTTPS REST API Services

Recently, I worked on an IoT gateway project where the gateway device needed to call the cloud’s REST API. The cloud implemented certain business logic and encapsulated resources into various URI interfaces for external systems to call. As a programmer, you should be quite familiar with REST APIs. Many of the basic services around us … Read more

Understanding the IoT Gateway Market: What is an IoT Gateway?

Understanding the IoT Gateway Market: What is an IoT Gateway?

Follow the IoT Planet to track the trends in the Internet of Things! “IoT Planet” focuses on sharing technologies and applications related to the Internet of Things. The IoT gateway is a device that connects IoT devices, systems, sensors, and the cloud, capable of performing protocol conversion and data collection. It provides local processing and … Read more