Communication Service Providers – Know Your Networks!

Home Network IoT

Of course, service providers “know” their networks – fibre-optic lines, wireless infrastructure, central office equipment and the last mile connections to their customers – but what’s connected to the networks, often via router endpoints is another matter. It’s time to take a fresh look at this issue – that is, the millions of unprotected home and small business networks and the hundreds of millions of computing, personal and IoT devices around the world.

2021 IoT Security Landscape

IoT Security Report 2021 from SAM Seamless Network

This report’s findings are based on in-depth research, security sources, and data collected from 132 million active IoT devices and 730,000 networks. We’ve analyzed DoS, DDoS, brute force attacks, DPI signature-based attacks, phishing attacks and more. More than 1 billion IoT attacks took place in 2021, nearly 900 millions of which were IoT-related phishing attacks.

Unmanaged Security Networks

What is an unmanaged security network? Within the security sphere, you often hear of Wi-Fi networks being referred to as either “managed” or “unmanaged.” As these networks are at the center of the things we do online, it’s important to remain informed about their capabilities (and potential weak spots and vulnerabilities). So what is it […]

Can a Hacker Remotely Connect to Your Wi-Fi Camera?

Updated as of 27.10.21 with information about about vulnerability patching from the affected vendors. ——– This research was performed by Matan Borenshtein and Alex Gelman from SAM’s Data Department. Take a quick mental inventory of the smart devices in your life. This includes gadgets located throughout your home, your office, and even those that you […]

Multiple Attempts to Exploit Realtek Vulnerabilities Discovered by Our Researchers

On August 16th, three days ago, multiple vulnerabilities in a software SDK distributed as part of Realtek chipsets were disclosed by IoT Inspector Research Lab [1]. The vulnerabilities allow attackers to fully compromise and take control of affected devices. Just yesterday, only two days after the publication, our home security solution, Secure Home, detected attempts […]

Virtual Patching: What Is It and Why Is It Foundational for Keeping Home and Small Business Networks Secure?

Security vulnerabilities are the cause of most cyber security attacks. Hackers exploit vulnerabilities in software to propagate malware, steal information, and infiltrate computer networks. Vulnerabilities arise from errors in software implementation. While these errors mostly cause bugs which are merely an inconvenience for users, some open a door to malicious activity. The most severe vulnerabilities […]

2020 IoT Security Landscape

Our team of researchers developed an overview of IoT security discoveries and recommendations as it relates to home and SMB networks. This information is based on the most up-to-date research, recent security sources, and data collected from 100M devices and 2M homes. Over the last year, 200 vulnerabilities were found in IoT devices that impact […]

Skip to content