What Shadow IoT Is and How to Mitigate the Risk

Illustration: © IoT For All The line between reality and science fiction is beginning to blur. Scenarios that used to be reserved for movies such as Terminator, The Matrix or Inception are quickly becoming a part of our daily lives. The internet itself is something of a technological miracle. Who …

Read More »

IoT Manufacturers Missed More than 100 Vulnerabilities in Devices Evaluated, According to New Research from Independent Security Evaluators

BALTIMORE–September 17, 2019–In a new, follow-up cybersecurity study of network attached storage (NAS) systems and routers since 2013, consulting and research firm Independent Security Evaluators (ISE)found 125 vulnerabilities in 13 IoT devices, reaffirming an industrywide problem of a lack of basic security diligence. The vulnerabilities discovered in the SOHOpelessly Broken …

Read More »