- We looked into MQTT brokers and CoAP servers around the world to assess IoT protocol security. Learn how to prevent risks and secure machine-to-machine (M2M) communications over MQTT and CoAP in our research.This research looks at the kinds of IoT projects being driven by global organizations, their key challenges and perceived threats, along with hard data outlining the frequency and type of attacks they’ve already experienced.The WEP and WPA2 wireless security protocols have both been discovered with vulnerabilities such as KRACK that hackers can exploit to compromise devices, spy on users, and perform other malicious activities. How can users secure their wireless connections?We discuss how manufacturers, users, and other involved parties can prevent IoT security incidents and work toward securing surveillance cameras in the market.This research examines the oft-overlooked infection vectors in today’s healthcare networks: exposed medical devices and supply chain attacks.Routers are the gateways to all internet-connected devices in homes. They could also be potentially welcoming a bevy of home network threats risking users’ information and security. Here we review the most noteworthy home network security events of 2017.Western European, UK, French, German, and US cities exposed. Are your connected devices searchable on the internet? Find out what you are risking.Intelligent Transportation Systems are comprised of a huge ecosystem of networks and technologies designed to regulate, direct, and control traffic. Find out what it takes to secure them against cyberattacks.Intelligent Transportation Systems are slowly being adopted all over the world. Securing the future of transportation from cyberattacks should be a top priority.