Application Security Flaws in the Internet of Things

Ken Munro

Pen Test Partners

While we have researched and documented many examples of hardware security issues with IoT devices, the most common source of IoT security flaws lies within the apps that are used to manage them. In this session we'll explore and examine the reasons for that, be it commercial pressure, code re-use, or even simple ignorance of the importance and brand benefits of securely coded apps. We'll also explain and offer advice that applies equally to IoT device manufacturers, app developers and anyone else in the IoT supply chain. Mobile app By far the most common source of compromise in our experience…....

You need to register or login to access the full content.

About Me!

Ken is a regular speaker at the ISSA Dragon’s Den, (ISC)2 Chapter events and CREST events, where he sits on the board. He’s also an Executive Member of the Internet of Things Security Forum and spoke out on IoT security design flaws at the forum’s inaugural event. He’s also not averse to getting deeply techie either, regularly participating in hacking challenges and demos at Black Hat, 44CON, DEF CON and Bsides amongst others.

Ken and his team at Pen Test Partners have hacked everything from keyless cars and a range of IoT devices, from wearable tech to children’s toys and smart home control systems. This has gained him notoriety among the national press, leading to regular appearances on BBC TV and BBC News online as well as the broadsheet press. He’s also a regular contributor to industry magazines, penning articles for the legal, security, insurance, oil and gas, and manufacturing press.


Related posts



Similar Categories