Router and IoT Device Vulnerabilities: Solutions to a Design Flaw

Tags: , , , , , , , , , , , , , , |

The Internet of Things Security Foundation (IoTSF) ManySecured Special Interest Group (SIG) is working to outline high level solutions to a design flaw/problem that affects millions of IoT devices and standard Internet routers. We are also encouraging the development of working prototypes of potential solutions that can be tested for scale and usability. February

Shortlist Announced for the IoT Security Champion Award 2021

Tags: , , , |

We are delighted to announce the finalists for the 3rd IoT Security Foundation Champion Award. This award seeks to celebrate organisations which demonstrate stewardship when it comes to IoT security. In alphabetical order, they are: Angoka CENSIS Crypto Quantique EXPLIoT We would also like to thank all other organisations which

Major Update Released for IoTSF’s Vulnerability Disclosure Best Practice Guide

Tags: , , , , , , |

We’re delighted to announce Release 2 of our popular best practice guide on Vulnerability Disclosure Best Practice. This is an essential element of cybersecurity hygiene and was one of the first ever guides we published back in 2017 to support our mission to 'make it safe to connect'. So much has

Router and IoT Vulnerabilities: Insecure by Design

Tags: , , , , , , , , , , , , , , , |

When directed to manage an IoT device or router using a browser, passwords and all communications are typically passed over an unencrypted connection. This is a security vulnerability which needs attention.

IoTSF ManySecured Special Interest Group

Tags: , , , , , , , |

With the support of the ManySecured project partners, the  IoT Security Foundation has created a Special Interest Group (SIG) to facilitate Interoperable Security through Collaboration with stakeholders in the IoT ecosystem value chain.

IoT Security Foundation launches co-ordinated vulnerability disclosure platform for IoT industry

Tags: , , , , , , , , , , , , |

An online platform designed to help IoT vendors receive, assess, manage and mitigate vulnerability reports has been launched by the IoT Security Foundation (IoTSF). VulnerableThings.com aims to simplify the reporting and management of vulnerabilities whilst helping IoT vendors comply with new consumer IoT security standards and regulations.

Article | Telemedicine, Remote Patient Monitoring, IoT, and Patient Data Security

Tags: , , , , |

With the numerous advancements in technology today, we now have capabilities that, just a few decades ago, would have likely been thought impossible. It’s easier than ever to access the internet, video chat, call, and text from almost anywhere.

IoT Security Foundation Opens Applications for the IoTSF Champion Award

Tags: , , , , , , , , , , , , |

The IoT Security Foundation is pleased to announce the IoT Security Champion Award is now open for applications. Now in its second year, the award seeks to identify and celebrate organisations which demonstrate good IoT security stewardship as part of the IoTSF mission to raise security standards and drive best practice

Smart Buildings Whitepaper Published by IoT Security Foundation

Tags: , , , , , , , , |

The IoT Security Foundation (IoTSF) has published a new, free to download whitepaper today titled: “Can you trust your smart building? Understanding the security issues and why they are important to you”. It is aimed at a broad range of stakeholders that together design, specify, procure, install/integrate, validate, operate and maintain building automation systems (BAS). It is specifically targeted at building owners, facility managers, technology providers, architects and installers.

Deploying IoT securely on healthcare networks: new IoT Security Foundation whitepaper outlines best practice for healthcare IT teams & OEMs

Tags: , , , , , |

Free whitepaper addresses underlying principles for securely deploying IoT systems on healthcare networks and how to cut risks for patients and their data. The use of IoT systems in healthcare creates significant opportunities for both OEMs and healthcare providers, but the inherent connectivity coupled with their use outside controlled hospital environments adds a risk to both patients and their data – risks that need to be managed.