IoT Security- Part 23 (IoT Security Compliance, Guidelines and Recommendations by GSMA Part 1)

To address the threat and vulnerability issues encountered by IoT devices for consumers,industry and critical infrastructure, a variety of IoT security standards have been developed and there are more standards under development.
IoT Security – Part 22 (Blind Signal Analysis using Python)

This blog is part of the IoT Security series, where we discuss the basic concepts about the IoT/IIoT ecosystem and its security. If you have not gone through the previous blogs in the series, I will urge you to go through those first
IoT Security – Part 21 (Famous IoT Attacks & Vulnerabilities)

This blog is part of the IoT Security series, where we discuss the basic concepts about the IoT/IIoT ecosystem and its security.If you have not gone through the previous blogs in the series, I will urge you to go through those first. In case you are only interested in reading about a few famous IoT attacks and vulnerabilities, feel free to continue.
IoT Security – Part 20 (101 – Introduction to Fault Injection Attack (FI))

Side Channel Attack Basics This blog is part of the IoT Security series, where we discuss the basic concepts about the IoT/IIoT ecosystem and its security. If you have not gone through the previous blogs in the series, I will urge you to go through those first. In case you are only interested in the fault injection (FI) introduction, feel free to continue.
IoT Security – Part 19 (101 – Introduction to Side Channel Attacks (SCA))

This blog is part of the IoT Security series, where we discuss the basic concepts about the IoT/IIoT ecosystem and its security. If you have not gone through the previous blogs in the series, I will u…
IoT Security – Part 18 (101 – Hardware Attack Surface: JTAG, SWD)

This blogpost intents to tutor you on the essentials of industrial standards such as Joint Test Action Group (JTAG) and debug ports namely Serial Wire Debug (SWD), the JTAG/SWD Interface, potential attack scenarios, and methods of attack.
IoT Security – Part 17 (101 – Hardware Attack Surface: UART)

We provide you information about the Universal Asynchronous Receiver-Transmitter (UART) Interface, its applications, possible attack scenarios, and methods of recon in addition to attack methods.
IoT Security – Part 16 (101 – Hardware Attack Surface: I2C)

This blog aims to educate you with the fundamentals of Inter-Integrated Circuit (I2C) Protocol, its application, potential attack scenarios, attack vectors as well as preventive measures you can implement.
IoT Security – Part 15 (101 – Hardware Attack Surface : SPI)

In this installment of the series, we teach you the basics of SPI protocol, its application, possible attack scenarios, methods of conducting an attack and how to prevent one.
IoT Security – Part 12 (MQTT Broker Security – 101)

We provide you an insight into the security mechanisms used to secure an MQTT connection between a client and a broker. We go over client authentication, connection security methods in addition to methods of access restriction and certificate revocation.