timing attack
What is a timing attack? A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about or access a system. There are practical implementations of timing attacks against some encryption methods. How do timing attacks work? Timing attacks measure how long a computer […]
Read MoreThe (Network) Core of Connectivity in Mobile Telecoms
Illustration: © IoT For All The core network typically stays imperceptible in cellular communication systems, unlike radio access networks, which reveal visible elements such as cell towers. But what is a core network, what does it do, and why do these functions matter to you as an end-user? Let’s take a look at the role […]
Read MoreRevolutionizing Aquaculture with AI
Illustration: © IoT For All In the heart of Norway’s aquaculture industry, innovative strides are shaping the future of fish farming. The integration of artificial intelligence (AI) with cutting-edge machinery addresses critical challenges. Underwater robots and fixed wireless access (FWA) technology are at the forefront. AI-Driven Innovation in Aquaculture Innovative approaches to enhance pen cleaning […]
Read MoreThe Benefits of OpenTelemetry for MQTT and IoT Observability
Illustration: © IoT For All OpenTelemetry (also known as OTel) is a collection of tools, APIs, and SDKs used for instrumenting, generating, collecting, and exporting telemetry data (metrics, logs, and traces) for analysis. The Cloud Native Computing Foundation (CNCF) manages this open-source observability platform, which aims to provide all the necessary components to observe your […]
Read MoreFactors to consider when securing industrial IoT networks
Specialized networks require specialized security. That’s particularly true when securing industrial IoT networks, which churn out mountains of critically important data every day. IIoT networks aren’t new; they’ve been around in some form for more than 20 years. It wasn’t until 2008, after the introduction of the Open Platform Communications Unified Architecture standard, that […]
Read MoreSecure Your Home: Set Up IoT Devices on a Separate Network
Illustration: © IoT For All Setting up IoT devices on a separate network can add an extra layer of security between these vulnerable devices and more sensitive tech like phones and laptops. IoT tools are often at a high risk of hacking, but users can still use them safely by isolating them on a secure […]
Read More7 ways AI could bring more harm than good
AI is everywhere. On our phones. On social media. On customer service lines. However, the question of whether artificial intelligence brings more harm than good is complex and highly debatable. The answer lies somewhere in the middle and can vary depending on how AI is developed, deployed and regulated. AI has the potential to bring […]
Read MoreZyxel Addresses Critical Security Vulnerabilities in NAS Products
Zyxel, a leading networking solutions provider, has recently published a security advisory addressing critical security vulnerabilities including authentication bypass and command injection vulnerabilities discovered in some of their personal cloud storage products (Specific models affected: NAS326 and NAS542). Four out of the six critical security vulnerabilities were reported by Gabor Seljan of BugProve, utilizing BugProve’s […]
Read Moredistributed antenna system (DAS)
What is a distributed antenna system (DAS)? In a distributed antenna system (DAS), a single signal source is connected to a group of antennas instead of to a single antenna. A DAS is most often used to distribute cellular network coverage to heavily populated buildings, such as offices, high-rise apartments, shopping centers or sports stadiums. […]
Read MoreKey Factors for Assessing a LoRa Sensor
Illustration: © IoT For All Selecting LoRa Sensors Based on The Use Case There is no universal solution in the world of LoRa sensors. Your choice will always depend on the unique requirements of your use case. In other words, you can’t buy a temperature and humidity sensor with the expectation that it will seamlessly […]
Read More