In the News
Whitepapers & Datasheets
VDOO Certified Security Engineer
book a demo
\\ book a demo
The VDOO Blog
All you need to know about IoT security
Subscribe to VDOO newsletter
November 3, 2019
VDOO Connected Trust Ltd. Comments on NIST IR 8267
We review the NIST report 8267, "Security Review of Consumer Home Internet of Things (IoT) Products", its approach and its contribution to cyber-security, and discuss the gaps and omissions that could be filled with additional research.
8 min read
August 16, 2019
Building a PSIRT Organization to Secure Connected Products
This article examines approaches connected device vendors can adopt in order to build a strategic cybersecurity capability to refrain from device exploitation.
12 min read
August 6, 2019
Working with the Community – disclosing significant vulnerabilities in multiple network switches
Read about the zero-day vulnerabilities in multiple network switches found by an external researcher and disclosed by VDOO
VDOO Research Team
6 min read
July 21, 2019
Linux Application Packaging
In the fifth and final article of our series on isolation, we examine ways to package Linux applications for easy isolation, using Ubuntu Core and Snappy, Flatpak, and Docker containers.
10 min read
July 9, 2019
The FTC Lawsuit over D-Link: Technical Perspective of Routers Security
Read about a few of the critical security issues automatically found by VDOO Vision™ in various leading brands' routers.
6 min read
July 7, 2019
Linux Jail Packages
In the fourth article of the series, we examine Linux jail packages as an easier way to apply isolation techniques, using Firejail as an example.
25 min read
June 23, 2019
Linux Kernel Isolation Features
In the third article of the series on isolation, we will cover several methods based on the features of the Linux kernel: cgroups, namespace isolation, the "capabilities" feature, and SECCOMP.
7 min read
June 9, 2019
Monitoring Embedded Linux Device Integrity with AIDE
In this article, we will examine one popular approach to file integrity monitoring on Linux, using the AIDE (Advanced Intrusion Detection Environment) solution
15 min read
May 26, 2019
Isolation and Integrity Techniques on Embedded Linux Devices
This is the first in a series of articles about isolation and integrity techniques on embedded Linux devices
20 min read