How to Protect Connected Home Devices and Appliances from Cyber Attacks

Tags: , , , , |

By David West, Engineering Director of Icon Labs. The original article can be seen here. In July of 2014, HP Labs did a study of 10 popular IoT devices and found security was shockingly bad. The researchers studied 10 devices, looking at end-to-end security capabilities including privacy protection, authorization, encryption, user interface protection, and