In the News
Whitepapers & Datasheets
VDOO Certified Security Engineer
book a demo
\\ book a demo
The VDOO Blog
All you need to know about IoT security
Subscribe to VDOO newsletter
December 3, 2019
Exploiting custom protocol handlers in Windows
In this article we focus on the mechanism for custom protocol handling in Windows and how it can be exploited using a simple command injection vulnerability, so our readers can avoid making such mistakes when implementing protocol handlers.
November 19, 2019
IoT Security - Monthly Newsletter - November 2019
The discovery of another Gafgyt (AKA Bashlight) variant shows the classic threat resulting from ever evolving malware, just like the many variants of the infamous Mirai.
17 min read
November 3, 2019
VDOO Connected Trust Ltd. Comments on NIST IR 8267
We review the NIST report 8267, "Security Review of Consumer Home Internet of Things (IoT) Products", its approach and its contribution to cyber-security, and discuss the gaps and omissions that could be filled with additional research.
8 min read
August 16, 2019
Building a PSIRT Organization to Secure Connected Products
This article examines approaches connected device vendors can adopt in order to build a strategic cybersecurity capability to refrain from device exploitation.
12 min read
August 6, 2019
Working with the Community – disclosing significant vulnerabilities in multiple network switches
Read about the zero-day vulnerabilities in multiple network switches found by an external researcher and disclosed by VDOO
VDOO Research Team
6 min read
July 21, 2019
Linux Application Packaging
In the fifth and final article of our series on isolation, we examine ways to package Linux applications for easy isolation, using Ubuntu Core and Snappy, Flatpak, and Docker containers.
10 min read
July 9, 2019
The FTC Lawsuit over D-Link: Technical Perspective of Routers Security
Read about a few of the critical security issues automatically found by VDOO Vision™ in various leading brands' routers.
6 min read
July 7, 2019
Linux Jail Packages
In the fourth article of the series, we examine Linux jail packages as an easier way to apply isolation techniques, using Firejail as an example.
25 min read
June 23, 2019
Linux Kernel Isolation Features
In the third article of the series on isolation, we will cover several methods based on the features of the Linux kernel: cgroups, namespace isolation, the "capabilities" feature, and SECCOMP.
7 min read