The Japanese Government Begins Testing the Security of Nationwide IoT Devices

The Japanese Government Begins Testing the Security of Nationwide IoT Devices

Click Subscribe to the “IEEE Electrical and Electronics Engineers Society” by clicking above. Stay updated on global technological advancements and open your mind for research and entrepreneurship. Illustration Source:iStockphoto Since February 20, the National Institute of Information and Communications Technology (NICT) in Japan has begun testing the security of IoT devices owned by citizens and … Read more

How LoRa, Starting Earlier than NB-IoT, Seizes the Trillion Yuan IoT Market in China

LoRa&IoT For Semtech, there is a seemingly “sweet” trouble. That is, the recognition of their product LoRa far exceeds that of their company name Semtech. However, the “awkward” part is not just this. As two of the most promising low-power wide-area network communication technologies in China, NB-IoT and LoRa have always been compared, with many … Read more

Smart Appliances, Cameras, Door Locks… Beware! IoT Devices Are ‘Selling’ Your Privacy

Smart Appliances, Cameras, Door Locks... Beware! IoT Devices Are 'Selling' Your Privacy

IntroductionAfter the “N Room” incident in South Korea, public concern over privacy breaches from surveillance devices has resurfaced. With the rapid development of the Internet of Things (IoT), smart cameras and appliances are increasingly favored. However, some of these convenient IoT devices can also become the “eyes and ears” for criminals, forming a networked, chain-like … Read more

Reverse Engineering Analysis: How Insecure is the Motorola Security Camera?

Reverse Engineering Analysis: How Insecure is the Motorola Security Camera?

Introduction In today’s world, who doesn’t need to guard against theft and intruders? Cloud security cameras have become increasingly popular. However, despite being labeled as “security” cameras, their actual security may not be very robust. The Motorola Focus 73 outdoor security camera is a case in point. The Motorola Focus 73 camera is an outdoor … Read more

Exploiting Router Vulnerabilities: A Case Study on TP-LINK

Exploiting Router Vulnerabilities: A Case Study on TP-LINK

Introduction: With the gradual development of the Internet of Things (IoT) era, the connections between devices have become closer, and each node cannot exist independently. Devices that are closely related to our daily lives, such as routers, cameras, and printers, increasingly impact various aspects of our lives, from personal privacy to intelligence gathering between hostile … Read more

Advancements in Sensor Attack Techniques in OT Networks: A Deep Dive

Advancements in Sensor Attack Techniques in OT Networks: A Deep Dive

Editor’s NoteThe Russia-Ukraine war has accelerated the innovation of tactics and techniques for cyber attacks on industrial control systems. The bombing incident involving pagers and walkie-talkies in the Lebanon conflict has reshaped the understanding of traditional cyber warfare. Artificial intelligence and large models have reduced the spatiotemporal costs for attackers. Targeted ICS malware, weaponized PLCs, … Read more

How to Ensure Siemens PLC Security in IoT Environments

How to Ensure Siemens PLC Security in IoT Environments

How to Ensure Siemens PLC Security in IoT Environments? This Comprehensive Protection Plan Makes Your Smart Factory Secure! Hello everyone, I’m Hanhan. Today, let’s talk about the security protection of Siemens PLC in the industrial IoT environment. With the development of smart manufacturing, PLCs are no longer isolated control devices but are connected to complex … Read more

New Thoughts on Security Architecture of NB-IoT IoT Systems

New Thoughts on Security Architecture of NB-IoT IoT Systems

Abstract: The application of NB-IoT in the Internet of Things is becoming increasingly widespread. However, due to characteristics such as massive access, low terminal computing power, and a variety of services, NB-IoT IoT systems face numerous security issues. This article first analyzes the system architecture of NB-IoT IoT systems, dissecting the security risks faced at … Read more

Research on IoT Security Protection Technology Based on NB-IoT

Research on IoT Security Protection Technology Based on NB-IoT

NB-IoT technology, with its advantages of full coverage, low power consumption, and low cost, overcomes the shortcomings of traditional IoT technologies, such as high power consumption, high costs, poor coverage, fragmentation, and difficulty in large-scale applications. It has been applied in various IoT application scenarios, including remote meter reading, asset tracking, smart healthcare, and smart … Read more

Bluetooth: Remember to Turn It Off When Not in Use

Bluetooth: Remember to Turn It Off When Not in Use

Bluetooth, as one of the essential features of smartphones and laptops, has solved the problem of short-range wireless transmission since its inception. With the updates in versions, the transmission rates have gradually improved, making Bluetooth a standard feature in almost every laptop and smartphone. Bluetooth has certain advantages over other short-range wireless transmission tools. Firstly, … Read more