Most devices IoT device connected via WiFi probably use the WPA2 protocol, chosen due to its reliability.
This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption
Millions of data points are currently processed and interpreted for the benefit of the smart home user,
The smartphone and smart home will share the same platform, and the phone will become an extension
CyberThings provides an end-to-end software solution that integrates unique security protocols
Haifa, Israel, September 4, 2016 – Co-Founder and Chief Security officer at CyberThings IoT, Mr. Yoav Rosenthal
Let's talk about IoT & Cyber security at our booth, Take the challenge and hack our demo... let's have fun
Join us, our Co-Founders, Rami & Rami is part of the IoT conference main panel, with Cisco, represented