Posts by Veridify Security
IoT Security Update: April 2019
This month we feature an exciting announcement that highlights the continued expansion of our involvement in industry associations as well as several news stories about security issues plaguing small IoT devices. Smart doorbells, routers and even ultrasound devices can all be vulnerable to attackers since security is often an afterthought even when it comes to…
Read MoreIoT Security Update: March 2019
While some national governments have been alleged to take advantage of weaknesses in IoT security to engage in espionage, in anticipation of hosting the 2020 Olympics, Japan is proactively hacking into its citizens’ IoT devices to search for vulnerabilities and guard against potential attacks. Read our roundup of the latest news about IoT security below.…
Read MoreWill Enterprise Prioritize IoT Security Over Innovation in 2019?
This month we highlight security issues of concern to both consumers and enterprises, and we also share video from SecureRF’s participation at recent key industry events. News Six Security Issues Set to Dominate IoT in 2019 The implementation of IoT security is expected to be a top priority for businesses this year, even at…
Read MoreIoT Security Trends and Predictions for 2019
More than half of consumers expected to spend money on technology products during this past holiday season, according to a recent survey from Arm. Even though consumers are embracing technology broadly in their professional and personal lives, they said they would buy even more technology products if their security and privacy concerns were assuaged. Security…
Read MoreChallenges of Cryptography for Low-energy Devices in the IoT
Many Internet of Things (IoT) devices have constraints on the amount of energy available to them. Examples include wireless sensors, RFID tags, NFC tags, smart cards and machine-to-machine (M2M) microcontrollers. Like most other connected devices, they need to be secured by cryptography that provides fast identification, authentication and data protection. However, while their low-energy usage…
Read MoreCryptography Basic for Chip Design Engineers
The purpose of cryptography is to assure data protection, authentication, and non-repudiation (so no one can deny they took part in a communication). While codes and encryption have existed in one form or another since ancient times, it’s thanks to advances in electronic cryptographic systems since the 1970s that today we enjoy things like secure…
Read MoreLightweight Cryptography for Embedded Systems in the IoT
Until a few years ago, the security of embedded systems was seldom a priority for vendors or consumers. Embedded systems were typically not attached to public networks, and tampering with them was arduous and required specialized software skills. The threat level against them was low to non-existent. But now that embedded systems and processors are…
Read MoreQuantum Computing’s Threat to Current Cryptosystems
The computers and communication systems we use today rely on cryptographic systems commonly based on factoring large numbers or finding discrete logarithms. Both these methods are secure because conventional computers lack the sheer computational power needed to break them. For example, a recent factoring for RSA with a long key was RSA-220 (220 decimal digits,…
Read MoreTop IoT Security Vulnerabilities
As consumers become more familiar with the Internet of Things, they’re opening their eyes to the IoT security threats that come with greater connectivity. And many of the threats that they fear the most are also on the radars of industry professionals. Consumers, according to a recent survey by Vormetric, fear hacking attacks on cars…
Read MoreMessage to Products in the IoT: An Ounce of Prevention is Worth a Pound of Cure
With the record breaking year of data breaches in 2015, it’s safe to say that many businesses have developed an adequate understanding of the vital need for cybersecurity on products or devices. Then why are so many businesses still only focusing on making their products smart but not secure? Why is technology for IoT security…
Read More