Internet of Things Security

The Internet of Things gets a new 10 times more reliable security feature

‘Physically unclonable function’ is 10 times more reliable than previous methods Rice University integrated circuit

Fast and energy-saving encryption for the internet of things

Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold. Most

Internet of Toys plays a major role in privacy and security

Action is needed to monitor and control the emerging Internet of Toys, concludes a new

Typical office scanner can be used as a cyberattack tool via laser or smartbulb

A typical office scanner can be infiltrated and a company’s network compromised using different light

A New Era of Internet Attacks Powered by Everyday Devices

When surveillance cameras began popping up in the 1970s and ’80s, they were welcomed as

World’s Most Efficient AES Crypto Processing Technology for IoT Devices Developed

Researchers at Tohoku University and NEC Corporation have discovered a new technique for compressing the

Device “Fingerprints” Could Help Protect Power Grid, Other Industrial Systems

Human voices are individually recognizable because they’re generated by the unique components of each person’s

Making the ‘Internet of Things’ configuration more secure and easy-to-use

With an ever increasing number of everyday objects from our homes, workplaces and even from

Security thinking for the internet of things

In the nascent “internet of things”, security is the last thing on people’s minds BARBIE

F.T.C. Says Internet-Connected Devices Pose Big Risks – Internet of Things

Federal Trade Commission on Tuesday confirmed some of the worst fears about Internet-connected devices, saying

From left: Ph.D. student Jason Oberg, computer science professor Ryan Kastner and postdoctoral research Jonathan Valamehr.
Computer scientists develop tool to make the Internet of Things safer

The tool leverages this technology to detect security-specific properties within a hardware system. For example,