The WEP and WPA2 wireless security protocols have both been discovered with vulnerabilities such as KRACK that hackers can exploit to compromise devices, spy on users, and perform other malicious activities. How can users secure their wireless connections?
Routers are the gateways to all internet-connected devices in homes. They could also be potentially welcoming a bevy of home network threats risking users’ information and security. Here we review the most noteworthy home network security events of 2017.
A critical factor contributing to the increasing expenses on mobile phones is fraud. Recently, the cost of criminal telecom equipment has decreased to the point that individuals can launch attacks. Read our report produced in collaboration with Europol.
Blockchain is one of the key concepts in IoT conversations today, touted to accelerate the scaling of IoT implementations. However, due to its nascent nature, what could be the potential risks, and how can blockchain play a role in IoT security?
With plenty of voice-based internet-of-things devices in use around the world, it is expected that they will become riddled with compatibility issues and privacy concerns. What threats are there and what can be done to mitigate them?