The gravity of the creepware situation warrants for security to be placed at the heart of quality assurance. Versatility and interoperability aspirations for Wireless Personal Area Networking protocols have also engendered a dangerous level of collaboration between traditional crime and cyber crime.
An attacker’s modus operandi can traverse sophisticated exploit kits to simple tactics such as a Telnet backdoor on embedded systems.
Aleph Tav Technologies is one among the few forerunners in advanced attack behavior analysis for connected devices. In a unique emulation + analytics laboratory, we simulate real time vulnerable deployment situations to study penetrability and exposure.
In the past year, our security researchers have conducted a series of objective assessments for device environments operating on technologies such as WiFi, ZigBee, RF, Bluetooth, 6LoWPAN and LoRaWAN. We can guide you in your secure-by-design goals and in building sustainably resistant deployments.