Kaspersky unveils operating system for embedded systems and IoT devices | IT PRO

KasperskyOS, as it has been called, works by only allowing documented operations to run. A developer must create their applications using traditional code and at the same time, define a strict security policy to include a range of documented functionalities.

Source: Kaspersky unveils operating system for embedded systems and IoT devices | IT PRO

Share

The internet of things can be hacked – and the risks are growing every day | TechRadar

We’re rapidly entering a new phase of technological evolution, in which pretty much everything around us is connected to the internet. The term used to describe this increasingly connected ecosystem is the internet of things (IoT), and it’s attracting the biggest names in tech, from Apple to Samsung and everyone in between.If the tech pundits are right, everything from toasters to light bulbs will soon have internet functionalities.

Source: The internet of things can be hacked – and the risks are growing every day | TechRadar

Share

The Internet Of Things Is A Cyber-Disaster In The Making | @dailycaller

The Internet of things (IoT) is certainly a convenience to us all, but it’s also a pathway to chaos for cyber criminals and enemies of the United States. Eric Lieberman, technology and law reporter for The Daily Caller tells of an unnamed university that was hacked through its light bulbs and vending machines.

Source: The Internet Of Things Is A Cyber-Disaster In The Making | @dailycaller

Share

How To Make 2017 The Year Of IoT Security | Forbes

People who make Internet of Things (IoT) devices still aren’t getting the message on security. And as these devices proliferate, the danger of increased attacks is getting more real.Late last year, popular internet services such as Netflix and Twitter were temporarily taken down amid a massive distributed denial-of-service (DDoS) attack that involved hackers deploying malware to simple webcams that many of us use without thinking. Authorities in the U.S. and U.K. were investigating the Mirai malware used in the attack to create a botnet, an army of zombie devices commanded by hackers. In fact, the Mirai code is still available online, allowing those with only modest technical skills to continue disrupting internet services on a major scale.

Source: How To Make 2017 The Year Of IoT Security | Forbes

Share

Government’s Role in the Internet of Things | Cisco Blogs

Governments around the world are beginning to realize that IoT adoption will be one of the key factors defining the competitiveness of their cities, provinces, countries, or regions and that IoT can help solve many of the chronic problems plaguing their economies and their environments. Thus, governments at various levels have a number of key roles to play…

Source: Government’s Role in the Internet of Thing | Cisco Blogs

Share

Four Security Priorities Will Drive Adoption of the Industrial Internet of Things | Industry Week

The potential of the Industrial Internet of Things (IoT) is bound only by the limits of our creativity. But its realization will forever be tied to security.We’ve seen this trend play out among early Industrial IoT adopters in the oil and gas industry, where there is tremendous motivation to adopt networked technologies and smart sensors. Many oil and gas facilities, especially offshore platforms, are located in environments we call “4D” – dirty, distant, dull and dangerous. In these harsh areas, automation and remote management can increase efficiency, improve performance, and enhance profitability. But most importantly, they keep people out of harm’s way.

Source: Four Security Priorities Will Drive Adoption of the Industrial Internet of Things | Industry Week

Share

The Internet of Things Means a Big Dilemma for Big Law Discovery | National Law Journal


“In the midst of the ensuing investigation, authorities think they may have found a new witness. That potential witness, however, wasn’t one of the people having drinks that night. It was Amazon Echo, a web-connected wireless speaker that, upon voice command, can provide information on a variety of topics and music. The device is, as some users put it, “always listening,” i.e., always ready to receive a command. Upon making a request of the device, it also records under 60 seconds of sound from its surroundings, which is erased as new sound as recorded. Amazon, however, refuses to release information on customers unless legally required.”

Source: The Internet of Things Means a Big Dilemma for Big Law Discovery | National Law Journal

Share

Federal lawmakers introduce bipartisan bill to study cyber security in connected cars | GeekWire

Connected cars are the future for the automotive industry, with more than 90 percent of vehicles expected to have built-in connectivity by 2020. But, as more vehicles link up to the internet, lawmakers are worried about their security.On Wednesday, lawmakers introduced a bipartisan bill in the U.S. House of Representatives that would direct the National Highway Traffic Safety Administration (NHTSA) to study cyber security in vehicles. Rep. Joe Wilson, R-SC, and Rep. Ted Lieu, D-Calif., co-sponsored The Security and Privacy in Your Car Study Act, which hopes to create a standard for safety in connected cars.

Source: Federal lawmakers introduce bipartisan bill to study cyber security in connected cars | GeekWire

Share

Call Issued to White Hat Hackers: Find the Flaws in New Automotive Software Updater | Yahoo Tech

A consortium of researchers today announced the development of a universal, free, and open-source framework to protect wireless software updates in vehicles. The team issued a challenge to security experts everywhere to try to find vulnerabilities before it is adopted by the automotive industry.

The new solution, called Uptane, evolves the widely used TUF (The Update Framework), developed by NYU Tandon School of Engineering Assistant Professor of Computer Science and Engineering Justin Cappos to secure software updates. Uptane is a collaboration of NYU Tandon, the University of Michigan Transport Research Institute (UMTRI), and the Southwest Research Institute (SwRI), and is supported by contracts from the U.S. Department of Homeland Security, Science and Technology Directorate.

Source: Call Issued to White Hat Hackers: Find the Flaws in New Automotive Software Updater | Yahoo Tech

Share

Internet of Things based DDoS attacks to rise in 2017: Report | The Indian Express

Cybercriminals will use distributed denial of service (DDoS) attacks in 2017 to extend their reach as there are now several Internet of Things (IoT) devices containing outdated codes and operating with well known vulnerabilities, a global security firm warned on Monday.

According to Sophos, global network and endpoint security firm, financial infrastructure is at greater attack risk as the use of targeted “phishing” and “whaling” continues to grow.

Source: Internet of Things based DDoS attacks to rise in 2017: Report | The Indian Express

Share