Internet of Things cyber security

CyRC Vulnerability Advisory: CVE-2022-39065 IKEA TRÅDFRI smart lighting gateway
Kari Hulkko and Tuomo Untinen | | Cybersecurity Research Center, Fuzz Testing, Internet of Things cyber security, Security News and Research
CVE-2022-39065 is a vulnerability affecting the IKEA TRÅDFRI smart lighting gateway. The post CyRC Vulnerability Advisory: CVE-2022-39065 IKEA TRÅDFRI smart lighting gateway appeared first on Application Security Blog ...

Smart home under fuzzing
Smart homes rely on secure devices. Fuzz testing identifies software vulnerabilities in smart devices by fuzzing wireless and IoT protocols. The post Smart home under fuzzing appeared first on Application Security Blog ...

Two-factor authentication misconfiguration bypass
Chaitanya Purandare | | Building Secure Software, Internet of Things cyber security, Web Application Security
In this post we discuss how an account with two-factor authentication could be bypassed if the password were breached. The post Two-factor authentication misconfiguration bypass appeared first on Application Security Blog ...

BYOD in the workforce: MDM and MAM with Microsoft Intune
Prasanthi Akella | | Internet of Things cyber security, Managing security risks, Mobile Application Security
Mobile device management and mobile application management are critical to securing your organization’s data and IoT devices. The post BYOD in the workforce: MDM and MAM with Microsoft Intune appeared first on ...

NIST provides recommended criteria for cybersecurity labeling for consumer software and IoT products
Taylor Armerding | | Internet of Things cyber security, Security News and Research, Software compliance quality and standards
Will NIST’s cybersecurity labeling for consumer software and IoT products help us achieve better security? Our experts weigh in. The post NIST provides recommended criteria for cybersecurity labeling for consumer software and ...

The future of IoT security
Taylor Armerding | | Building Secure Software, Internet of Things cyber security, Penetration Testing, Security and developer training
IoT security begins with building secure software. Learn how to embed security into your SDLC to avoid becoming an easy target for hackers ...