Blog

23
Jun

Securing your devices against Ripple20: 19 critical vulnerabilities in IoT devices

Some of the 19 vulnerabilities allow arbitrary code to be executed remotely and have the highest CVSS score.

The Israeli security company JSOF recently discovered 19 vulnerabilities in the code of a TCP/IP implementation designed in the 90s that has been widely used across all major device types

Read More

27
May

How to Prevent SIM Card Misuse in IoT Devices

This is the fifth in a series of blog posts dedicated to the topic of IoT security to mark the launch of the EMnify Guide for Cellular IoT Security which you can download here. The previous post in this series included a useful video explaining how your IoT solution is secured with IoT cloud

Read More

6
May

IoT Security: SMS and Voice Service Attacks and How to Prevent Them

This is the fourth in a series of blog posts dedicated to the topic of IoT security to mark the launch of the EMnify Guide for Cellular IoT Security which you can download here. The previous post in this series compared Cellular, LoRa and WiFi in terms of IoT device security.

In the first post 

Read More

29
Apr

How to monitor and optimize your IoT device connectivity

This is the third post in a four-part blog series dedicated to informing four key decisions a business is typically faced with in its IoT connectivity journey. The second post in this series outline how to choose the right connectivity provider for your business.

In order to effectively and

Read More

15
Apr

IoT Device Security: Comparing Cellular, LoRa and WiFi

This is the third in a series of blog posts dedicated to the topic of IoT security to mark the launch of the EMnify Guide for Cellular IoT Security which you can download here. The previous post in this series considered the security benefits of remote IoT device access.

In our “Introductory

Read More

1

Are you searching for the right IoT solution
for your business?

Check out our Introductory Guide to Wireless Connectivity
to make the best decision for your IoT use case.
Download our introductory guide to wireless connectivity

Subscribe to the Blog

    Recent Posts