EXPLIoT(@expliot_io) 's Twitter Profile Photo

Discover the world of CAN Busβ€”a crucial communication protocol in vehicles and beyond.

As CAN hacking rises with IoT advancements in automotive, this video explores security testing for CAN-enabled devices.

➑️ youtube.com/watch?v=m4sdfu…

account_circle
Fintech Association of Kenya(@FINTAK_Official) 's Twitter Profile Photo

🏍️ Watu Africa & Nodle team up to boost boda boda security in Africa! 🏍️ Blockchain & IoT tech for real-time tracking in Uganda, expanding across 6+ countries.

🏍️ Watu Africa & Nodle team up to boost boda boda security in Africa! 🏍️  Blockchain & IoT tech for real-time tracking in Uganda, expanding across 6+ countries. #WatuAfrica #Nodle #BlockchainTechnology #IoTSecurity #BodabodaSafety #AfricanInnovation #TechForGood
account_circle
Wilderness Labs Inc.(@wildernesslabs) 's Twitter Profile Photo

Protecting your data is paramount. Our Meadow IoT platform ensures it stays secure with SSL communication and encrypted MQTT payloads. Trust Meadow for fortified IoT securityπŸ”’

Security

Protecting your #IoT data is paramount. Our Meadow IoT platform ensures it stays secure with SSL communication and encrypted MQTT payloads. Trust Meadow for fortified IoT securityπŸ”’ 

#IoTSecurity #SecureMessaging
account_circle
IoTSecurity101(@iotsecurity101) 's Twitter Profile Photo

Another milestone , successfully completed 6 years with telegram group , and developing more better these days towards research.. thanks for support so far

website : iotsecurity101.org

security

Another milestone , successfully completed 6 years with telegram group , and developing more better these days towards research.. thanks for support so far 

website : iotsecurity101.org

#iot #iotsecurity #group #hardwarehacking
account_circle
TCM Security(@TCMSecurity) 's Twitter Profile Photo

Today we continue our smart camera series! Follow along as Andrew extracts firmware from the camera's board. In Part 3, he'll unpack the firmware & look for the password.

Ideas on smart devices we should hack? Let us know!

security

account_circle
Indusface(@Indusface) 's Twitter Profile Photo

πŸ”’The edition of Financial Express publishes an article by Venkatesh Sundar (Founder and President, Americas, Indusface) where he underscores the criticality of cyber risks in the 5G era.

πŸ”’The edition of @FinancialXpress publishes an article by Venkatesh Sundar (Founder and President, Americas, Indusface) where he underscores the criticality of cyber risks in the 5G era.

#securitynews #telecomsecurity #cybersecurity #iotsecurity #api #cyberrisks #cyberthreats
account_circle
TCM Security(@TCMSecurity) 's Twitter Profile Photo

Hack a smart camera with Andrew! πŸ“·

Watch as he walks through his process in this clip, the first installment of a multi-part series; this time, his focus is on finding a shell.

Part #2 coming soon πŸ”œ

security

account_circle
Connectivity Standards Alliance(@csaiot) 's Twitter Profile Photo

'Building on the foundation of , we've re-envisioned Google Home as a platform for developers - all developers, not just those that build devices.” Matt Van Der Staay, Google for Developers

bit.ly/3K2GK1i

'Building on the foundation of #Matter, we've re-envisioned @Google Home as a platform for developers - all developers, not just those that build #smarthome devices.” Matt Van Der Staay, @googledevs 

bit.ly/3K2GK1i

#csaiot #standardsmatter #iotsolutions #iotsecurity
account_circle
VirtuPort(@VirtuPortMEA) 's Twitter Profile Photo

Building a hyper-resilient cyber strategy is crucial in today's digital world! Learn about key considerations for protecting your organization from cyber threats. Stay ahead with proactive measures and robust security practices.

Building a hyper-resilient cyber strategy is crucial in today's digital world! Learn about key considerations for protecting your organization from cyber threats. Stay ahead with proactive measures and robust security practices.

#CyberSecurity #IoTSecurity #SaudiVision2030
account_circle