Mender blog
Top 3 IoT security challenges
With the advent of IoT and proliferation of connected devices across a variety of industry verticals, we are seeing a slew of new security vulnerabilities emerging. We live in an era where everything has turned ‘smart’: Smartphone, smart home, smart lock, smart camera and so on. A day going by without interacting with an internet connected device seems next to impossible. IoT has created a more c...
Read the articleThe intersection of modern OTA updates and configuration management
The term over-the-air (OTA) updates is today often used interchangeably with “software updates” in the context of connected devices and IoT.
However, the term originates from the telecom industry, where it has been used for a much wider scope than just software. For example, a special type of SMS message from the cellular provider to all phone subscribers can change the way phones are configure...
Read the articleThe world's most secure and robust OTA solution
During 2015 we spent a lot of time talking to users and companies in the embedded space. Our early findings which continued to be confirmed during the market research showed that 50% of all connected devices had no way to be remotely updated. Besides some outliers, the other 50% had homegrown solutions to do over-the-air updates (OTA). Common for almost all homegrown solutions were their fragili...
Read the articleTop three requirements for OTA software updates for IoT
Updating your device software, whether its system or application level, may seem an easy task to do when you first start your IoT project but then you realize what’s involved is more than just overwriting some files with new copies. What if the power goes out while the device is updating? What if the connectivity is lost due to poor network quality? What if a third party sends a fake update? What...
Read the article4 ways to minimize IoT cybersecurity risks
With close to 400k followers, the Twitter account named Internet of Shit is the epitome of the dire situation emerging as we stumble into a world of connected devices.
Governments around the world are waking up to a reality where the severity of vulnerable technologies grows with our increasing dependence on technology. While hackers enjoy everything from ransomware to stealing compute power for...
Read the article