It is easy to become jaded with the term “blockchain.” Although the turbulent nature of blockchain ICOs may have added credibility to the claims of skeptics, skepticism can be healthy when new disruptive technology emerges. In fact, skepticism is likely a form of fuel for emerging technologies. As the Hype Cycle of any new technology… Continue Reading
Today we’re proud to make two major release announcements: Multi-Factor Authentication and the next iteration of the Hologram Global Dash. Multi-Factor Authentication for Connected Devices Already standard for much of the internet, existing multi-factor authentication methods protect user accounts from unauthorized access. They typically require something you know, such as a username/password, in addition to… Continue Reading
A comprehensive list of KRACK affected vendors.
Security is top priority going into the new year for the IoT industry. In the wake of the cyber-attack on Dyn DNS that took down almost half the internet in October, IoT developers are getting serious about closing up security holes in 2017 (and, essentially, until the end of time). But IoT is still an… Continue Reading
There are two versions of the future when it comes to IoT security. The first is an ecosystem that is overrun with vulnerabilities, leaving consumer and business customers at risk of a major breach. The second is a story about diligence and careful calculation—the need for builders to watch their security protocols like a hawk. Remember… Continue Reading
Hackers are using all sorts of devices to launch their dirty DDoS attacks. Don’t let your security camera, DVR or nanny cam become part of a botnet.
Is your refrigerator running… a targeted DDoS attack without your knowledge? If it’s connected to WiFi, it very well might be. Many (too many) of the connected devices that make up the Internet of Things (IoT) are extremely easy to hack. New IoT devices are being designed and released every day — from consumer items,… Continue Reading
Last month, while engineers around the world were building the next generation of connected devices, a piece of malware named Mirai was quietly going about its own business. While botnets — the colloquial term for a network of hacked devices working together — are always swirling around the internet, this one was different. Instead of… Continue Reading
Best Practices Securing Connected Devices and Vehicles – Hologram – Cellular Connectivity for the Internet of Things
Securing The Internet of Things: Privacy, Data and Device Control