# Title RETURN TO OVERVIEW PAGE
2020-08-12 How to Secure the IoT with Blockchain (20:00) IoT: Internet of Things
2020-08-12 When Will IoT Become a National Security Issue?
2020-07-24 IoT Security is Top of Mind for Both Users and Providers
2020-07-20 Building secure cloud-connected IoT solutions with Windows 10 IoT Enterprise (1:08:49)
2020-07-16 Gadget-makers face ban on easy-to-guess passwords
2020-07-14 Leveraging IoT for long-term stadium security
2020-07-13 Counting Down the Top Ten IoT Security Threats
2020-07-07 BSA IoT Security Principles
2020-07-06 IoT Security at Home
2020-07-06 Wi-Fi signals can be hacked by criminals
2020-07-02 ETSI Releases World-Leading Consumer IoT Security Standard
2020-06-30 IoT security prioritization creeps to the forefront
2020-06-29 Understanding the needs of IoT security
2020-06-22 Millions of IoT Devices Affected by Ripple20 Vulnerabilities
2020-06-17 The current landscape of global IoT security regulations (26:50)
2020-06-05 Report details new cyber threats to elections from COVID-19
2020-06-04 How to Deal with Challenges of IoT Security (27:08)
2020-05-28 Smart Yet Flawed: IoT Device Vulnerabilities Explained
2020-05-15 Risks Overshadow Benefits with Online Voting, Experts Warn
2020-05-09 IoT Security (2:05:57)
2020-02-28 CyberX 2020 Global IOT and ICS Risk Report (28:14)
2020-02-28 Securing your network from IOT devices using the EdgeRouter X (28:18)
2020-02-26 Building a Comprehensive IoT Security Testing Methodology (52:45)
2020-01-24 7 Steps to IoT Security in 2020
2019-12-02 6 IoT Security Predictions for 2020 
2019-11-19 Australia releases draft IoT cybersecurity code of practice
2019-11-03 Voting Machines: Last Week Tonight with John Oliver (19:21)
2019-10-21 Amazon Echo and Google Home owners spied on by apps
2019-09-11 IoT Security Challenges in a 5G Era (57:16)
2019-08-22 Privacy leaks in smart devices: Extracting data from used smart home devices (51:46)
2019-08-11 Gadgets can be hacked to produce 'dangerous' sounds, says researcher
2019-07-10 Anaesthetic devices 'vulnerable to hackers'
2019-06-27 What is a botnet? When armies of infected IoT devices attack
2019-06-03 That major Google outage meant some Nest users couldn’t unlock doors or use the AC
2019-04-10 Security best practices for the Internet of Things with Google Cloud (44:25)
2019-04-05 Cyber-attacks 'damage' national infrastructure
2019-04-04 Mirai Variant Spotted Using Multiple Exploits, Targets Various Routers
2019-04-03 Fake cancerous nodes in CT scans created by malware....
2019-04-03 Hospital viruses: Fake cancerous nodes in CT scans, created by malware, trick radiologists
2019-04-01 IoT backdoors in cars (57:19)
2019-03-08 Security holes found in smart car alarms
2019-03-07 Ultrasound Machines Are Vulnerable to Hacking
2019-03-06 IoT Expands the Botnet Universe
2019-02-05 Children's smartwatch recalled over data fears
2019-01-27 Japanese government plans to hack into citizens' IoT devices
2019-01-22 Family says hacked Nest camera warned them of [nonexistent] North Korean missile attack
2019-01-07 Home items are getting smarter and creepier, like it or not
2019-01-07 You Bought Smart Speakers Over the Holidays. Now What Are Amazon and Google Doing With Your Data?
2018 [Thanksgiving with the IoT Devices]
2018 2018 Internet Of Things 50: 10 Coolest IoT Security Companies
2018 5 IoT Security Challenges: Key Data, Examples & Solutions [2018]
2018 Adhering to NIST Cybersecurity Framework with Indegy Security Suite
2018 Black Hat 2018: IoT Security Issues Will Lead to Legal ‘Feeding Frenzy’
2018 Click Here to Kill Everybody
2018 Gartner Says Worldwide IoT Security Spending Will Reach $1.5 Billion in 2018
2018 Hackable implanted medical devices could cause deaths, researchers say
2018 Hot tub hack reveals washed-up security protection
2018 I Bought Used Voting Machines on Ebay for $100 Apiece. What I Found was Alarming.
2018 Internet of Things: Who is watching you?
2018 IoT Security And Reducing Business Interruption
2018 IoT security spending to reach $1.5 billion in 2018
2018 IOT Security, Privacy and Safety (56:33)
2018 IoT World Today
2018 MiSafes' child-tracking smartwatches are 'easy to hack'
2018 Parrot uses Amazon Alexa to pile up orders (01:11)
2018 PewDiePie printer hackers strike again
2018 Rapid Maturity of IoT Projects Highlights Risks
2018 Security for the Internet of Things (AT&T)
2018 Security Vulnerability in Smart Electric Outlets
2018 The Amazon Alexa Eavesdropping Nightmare Came True
2018 Top IoT Concerns for Information Security and Privacy Professionals
2018 Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States
2018 Turning A Blind Eye Does Not Fix Voting Security Vulnerabilities (56:42)
2018 Two arrested as Gatwick reopens following latest drone sighting
2018 UK now has systems to combat drones
2018 Voting Systems Security and Risk Limiting Audits (57:23)
2018 VTech flags tablet flaw after BBC Watchdog probe
2018 When out-of-date code causes chaos
2017 Amazon Echo turned into covert microphone 
2017 Best Practices with IoT Security - Andrew Kiggins (35:39)
2017 Hackers breach dozens of voting machines brought to conference
2017 How Can I Protect My Smartphone and Smart TV From Getting Hacked?
2017 How To Secure Your IoT Product - Ron Keidar (23:02)
2017 IoT Security: High Stakes for Billions of Devices - Mark Weatherford (1:26:45)
2017 Regulating the Internet of Things - RSA Conference (46:54)
2017 U.S. Elections Systems Vulnerable, Lawmakers Told In Dueling Hearings
2017 Understanding IoT Security vs IT Security - Caleb Barlow (3:43)
2017 US official: Russia 'hacked' 21 US states in election
2017 WannaCry helps speeding drivers dodge fines in Australia
2016 “Internet of Things” security is hilariously broken and getting worse
2016 3D printers vulnerable to spying
2016 Are connected bikes key to improving urban planning? (17:12)
2016 Breaking News: IoT Certification Program to Roll Out Next Month 
2016 DATA & ANALYTICS - IoT - from small data to big data: Building solutions with connected devices (34:26)
2016 Hacking connected lightbulbs to breach Air-Gapped networks
2016 How easy is it to hack a home network?
2016 iDevices adds new Siri-controlled wall outlets, switches and light sockets to its HomeKit lineup...
2016 Internet of Medical Things  CyberSecurity Webinar
2016 IoT Realized - The Connected Car v2 (1:15:12)
2016 IoT Security (58:29)
2016 IOT: The Biggest Security Threat to Everything (26:39)
2016 Nest Reminds Customers That Ownership Isn't What It Used to Be
2016 Nest thermostat bug leaves users cold - BBC News
2016 Philippines elections hack 'leaks voter data'
2016 SC Magazine articles about IoT Security
2016 The Dyn Cyber Attack is a Test of the IoT and the Ability to Defend Against the Silent Intruder
2016 The Internet of Things is a security nightmare, warns EFF
2016 The Internet of Things: A new prescription for consumers and manufacturers - Health Management...
2016 The internet of things: how your TV, car and toys could spy on you
2016 The risk of connectivity: Hacking our watches, fridges, guns and more (14:10)
2016 The UK firm that wants to give big spenders a big shock - BBC News
2016 Tomorrow's Buildings: Help! My building has been hacked
2016 Tomorrow's buildings: Is world's greenest office smart? - BBC News
2016 US intelligence chief: we might use the internet of things to spy on you
2016 US parents warned on hacked baby webcams - BBC News
2016 Volvo tries out 'keyless car' app in Sweden - BBC News
2016 What is the problem with IoT security? - Gary Sims (15:14)
2016 Your next car will be hacked. Will autonomous vehicles be worth it?
2015 Can We Secure the 'Internet of Other People's Things'?
2015 Cyber Attacks Can Now Kill - i-HLS
2015 Engineering the IoT (38:05)
2015 Everything You Want to Know About IoT (53:59)
2015 Hackers can hijack Wi-Fi Hello Barbie to spy on your children
2015 I Can't Let You Do That, Dave
2015 Internet Of Things: The Rubber Meets The Road
2015 IoT Realized - The Connected Car (1:09:22)
2015 Lecture 1: Introduction to the Internet of Things (38:24)
2015 Lecture 2: Electronics for the Internet of Things (45:45)
2015 Lecture 3: Software for the Internet of Things (58:22)
2015 Lecture 4: Sensors and peripherals (1:19:10)
2015 Medical Robots Can Be Hacked During Surgery, Researchers Find
2015 Security Experts Hack Teleoperated Surgical Robot 
2015 Thousands of 'directly hackable' hospital devices exposed online
2015 Toys could be used as spying devices, MPs told - BBC News
2014 Data and Analytics for IoT (34:03)
2014 The Internet of Insecure Things (8:59)