Physical Security Risks
Gaining physical access allows perpetrators to carry out a hardware-based attack through the insertion of a Rogue Device.
MouseJack
MouseJack attack is a term used to describe a security vulnerability that affects certain wireless mice and keyboards.
CCTV IoT Cameras – Is someone watching you?
IoT CCTV Cameras, are connected to the internet with an IP address that can be the target of a hardware attack.
Section 889(b)
Section 889(b) prohibits the federal government, government contractors, from using certain covered telecommunications equipment or services.
Pi400 is it 100x safer than Pi4?
The Raspberry Pi Foundation has recently announced the launch of a new product; the Raspberry Pi400-is it 100x safer than Pi4? This is an excellently integrated device whereby the computer is embedded in a compact keyboard with a 1.8GHz ARM CPU. This is slightly faster than the previous Raspberry Pi model. Additionally, the device comes…
Connected Devices Security
Connected devices, also known as the Internet of Things (IoT), refer to physical objects embedded with sensors connect over the internet.
Securing IoT Healthcare Devices
Discover effective strategies to secure IoT devices in healthcare. Learn how to protect patient data and mitigate network security risks.
RansomWhere? Everywhere!
RansomWhere is playing on the similarity in pronunciation between “ransomware” and “ransom where,” suggesting that can be everywhere.