Mobile Phone Security
Mobile Phone Consultancy
Mobile Phone Security
Software
Mobile Security Leaflet
InnOvaTe_Launchpad_2016_Prize_Winner_with_pic_v4

Mapping New IoT Security Recommendations

In late 2018, to coincide with the launch of the UK’s Code of Practice for Consumer IoT Security we launched a website: iotsecuritymapping.uk which mapped IoT recommendations and standards from around the world. Our previous blog explains more of the detail. Earlier this year, we updated the site to include the European Telecommunications Standards Institute (ETSI) Technical Specification, TS 103 645 (pdf) which originated from the Code of Practice.

Today we have launched an updated version of the mapping site which stretches the landscape further with a number of new recommendations from around the world. These have either… Continue reading

David Rogers awarded MBE in the Queen’s Birthday Honours list 2019 for services to cyber security

London – Saturday 8th June 2019: Copper Horse, a mobile and IoT security company, today announced that its CEO David Rogers, has been awarded an MBE in recognition of his services to cyber security, in The Queen’s Birthday Honours List 2019.

David is the author of the UK’s Code of Practice for Consumer IoT Security. Published in October 2018 it provides invaluable guidance, for all parties involved in the development, manufacturing and retail of consumer Internet of Things (IoT). The Code was developed as part of the Secure by Design initiative, which was developed in response to… Continue reading

ETSI publishes European Standard on Consumer IoT Security


David Rogers writes about the launch of the specification: ‘Cyber Security for Consumer Internet of Things’ from ETSI’s TC Cyber group.

Today the European Telecommunications Standards Institute (ETSI) announced the publication of their ETSI Technical Specification, TS 103 645 (pdf).

This work builds on the UK Code of Practice for IoT Security and has had input from experts around the world. It is great that this work has been elevated up to European level and published as a standard. This means a much wider technical audience and crucially, official endorsement at European level by companies and governments.

The… Continue reading

Investigating the State of Vulnerability Disclosure in Consumer IoT Products

 

In August 2018, we were asked by the IoT Security Foundation to look at companies across the world producing consumer focused Internet of Things products and see what the situation is for security researchers when they try to contact these businesses.

 

Security researchers often have problems when it comes to speaking to companies about their findings, but we wanted to gather some real data about the current market situation because no-one had done this before. In this process, we also tried to record what types of mechanism were in place – i.e. did the company follow best practice… Continue reading

Mapping IoT Security and Privacy Recommendations and Guidance

 

The UK’s work on consumer IoT security and privacy, led by the Department for Digital, Culture, Media & Sport (DCMS) has been continuing since the publication of its work on Secure by Design and the Code of Practice for Consumer IoT Security went out for public comment in March 2018. Our team has been working on mapping IoT security and privacy guidance to the Code of Practice and we’re now launching https://iotsecuritymapping.uk to support the initiative, including hosting open data files with all the various mappings contained within.

 

 

We believe this is going to be really helpful… Continue reading

What are your devices saying about you?

 

In our recent blog, Ryan Ng wrote about new Smart Home connected devices being developed and sold in 2018. There are many new and innovative ways to improve our lives using technology appearing in stores and on crowd funding platforms such as Kickstarter every day. The majority of these devices interact with mobile apps, whether they are sending notifications or allow the user to control functionality, these devices often require a hub to connect the devices to the wider internet. Smart speakers and thermostats are now being used as hubs to connect other smart home appliances. Many of… Continue reading

New Smart Home Technology in 2018

 

Copper Horse’s Ryan Ng takes a look at some of the smart home technology that has taken in his interest in the first part of the year.

 

A few months into 2018 and we are already seeing a lot of new smart home technology, some of which are great ideas and useful devices, but others which are questionable.

 

To kick-start this year we had the Consumer Electronics Show (CES) in January where lots of new products and concepts were shown off. This included all kinds of tech including cars, TVs, and of course smart home devices. A… Continue reading

Discussing the UK government’s Code of Practice for IoT Security and the Future

 

Copper Horse’s CEO, David Rogers had a chat with Rocco’s Jason Bryan for the Rocco Radio Newsdesk about the launch of the UK government’s Secure by Design report and the Code of Practice on IoT security. The government’s Secure by Design report is available here.

 

To listen, click the player below:


The podcast covers a range of topics including:

  • the UK government’s work to protect UK consumers:
    • how work from the mobile industry can be carried over into the IoT world.
    • what circumstances and threats led to the… Continue reading

Vehicle Communications and the Road to Driverless Automotive

Copper Horse’s Development Lead, Mark Neve discusses technology being deployed in the vehicle comms space.

 

The car of tomorrow is going to be communicating with many different things and not just for passenger entertainment. The field of Vehicle-to-“X” communications is growing considerably. The X can mean Vehicle-to-Vehicle (known as V2V) or Vehicle-to-Infrastructure (V2I) and even V2P – Vehicle to Pedestrian or V2B – Vehicle to Bike, with many different applications within. The opportunities to improve road safety are enormous but the security and safety implications of getting it wrong are equally as important. This is something that we’re looking… Continue reading

How the UK’s Code of Practice on IoT security would have prevented Mirai

 

The UK’s report on Secure by Design was released today after a significant amount of work from some of the best minds in government, academia and industry. This is one of the first major steps in the world by a government towards eliminating some of the bad practices that have plagued connected devices and services for many years.

 

 

 

Copper Horse’s CEO, David Rogers was the author of the UK’s Code of Practice for Security in Consumer IoT and services as part of its report on Secure by Design, in collaboration with DCMS, the NCSC,… Continue reading

spacer

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations. We offer security training and have a huge range of consulting expertise to help you in mobile telecoms and connected products security. If you have an interesting and complex security problem, we are here to help.

Copper Horse Tweets

Follow @copperhorseuk on twitter.

GSMA Associate Member

GSMA Associate Member

Copper Horse is an Associate Member of the GSM Association

IoT Security Foundation

IoT Security Foundation

Copper Horse are Founding and Executive Board member of the IoT Security Foundation.

Cyber Essentials Certified

Cyber Essentials Certified