IoT Devices: Vulnerabilities and Security Risks

IoT Devices: Vulnerabilities and Security Risks

Recently, two American internet service providers suffered a network attack, causing many well-known websites to be inaccessible, claiming that half of America’s internet was paralyzed. Subsequent investigations revealed that hackers exploited viruses to infect IoT devices, which were then used to launch network attacks. Internet security experts stated that the number of infected IoT devices … Read more

2020 IoT Terminal Security White Paper

2020 IoT Terminal Security White Paper

Click the blue text to follow us 1. Introduction In the era of consumer internet, the value of the Internet of Things (IoT) itself has not been fully explored. With the advent of the 5G era, the IoT field has ushered in new development opportunities. The 5G communication technology defines three major application scenarios: eMBB, … Read more

Beware! 6 Default Configurations Favored by Attackers

Beware! 6 Default Configurations Favored by Attackers

Default configurations may contain numerous security vulnerabilities. For your network security, here are 6 products and services that need careful examination. When it comes to devices connected to corporate networks, “out of the box” seems like an enticing promise, but little do we know, it is also where the danger lies. Imagine devices being able … Read more

How Vulnerable IoT Devices Face Security Challenges

How Vulnerable IoT Devices Face Security Challenges

“ The era of the Internet of Things is quietly approaching. From routers, smart speakers, and refrigerators to cars and industrial equipment, more and more items are connecting to the Internet. However, the rapidly developing IoT brings convenience while also posing security risks, becoming a pain point in the development of the IoT industry. ” … Read more

Security Issues in Mobile Applications: A Study on Server Communication

Security Issues in Mobile Applications: A Study on Server Communication

On the last day of August, here’s a paper from the Software Engineering Conference ESEM 2021, which investigates an interesting issue: many mobile applications (apps) may have the same or similar security problems as general web applications during communication with their dedicated servers. The authors tested and analyzed a large number of URLs extracted from … Read more

Firmware Analysis of IoT Devices: A Beginner’s Guide

Firmware Analysis of IoT Devices: A Beginner's Guide

Introduction In recent years, IoT devices have infiltrated every aspect of life, bringing great convenience to people. However, due to the data and privacy information generated in daily life, their security has become a growing concern. In the previous article, we discussed controlling Xiaomi devices using scripts, focusing on security analysis from a traffic perspective; … Read more