Kaspersky unveils operating system for embedded systems and IoT devices | IT PRO

KasperskyOS, as it has been called, works by only allowing documented operations to run. A developer must create their applications using traditional code and at the same time, define a strict security policy to include a range of documented functionalities.

Source: Kaspersky unveils operating system for embedded systems and IoT devices | IT PRO

Share

The internet of things can be hacked – and the risks are growing every day | TechRadar

We’re rapidly entering a new phase of technological evolution, in which pretty much everything around us is connected to the internet. The term used to describe this increasingly connected ecosystem is the internet of things (IoT), and it’s attracting the biggest names in tech, from Apple to Samsung and everyone in between.If the tech pundits are right, everything from toasters to light bulbs will soon have internet functionalities.

Source: The internet of things can be hacked – and the risks are growing every day | TechRadar

Share

The Internet Of Things Is A Cyber-Disaster In The Making | @dailycaller

The Internet of things (IoT) is certainly a convenience to us all, but it’s also a pathway to chaos for cyber criminals and enemies of the United States. Eric Lieberman, technology and law reporter for The Daily Caller tells of an unnamed university that was hacked through its light bulbs and vending machines.

Source: The Internet Of Things Is A Cyber-Disaster In The Making | @dailycaller

Share

How To Make 2017 The Year Of IoT Security | Forbes

People who make Internet of Things (IoT) devices still aren’t getting the message on security. And as these devices proliferate, the danger of increased attacks is getting more real.Late last year, popular internet services such as Netflix and Twitter were temporarily taken down amid a massive distributed denial-of-service (DDoS) attack that involved hackers deploying malware to simple webcams that many of us use without thinking. Authorities in the U.S. and U.K. were investigating the Mirai malware used in the attack to create a botnet, an army of zombie devices commanded by hackers. In fact, the Mirai code is still available online, allowing those with only modest technical skills to continue disrupting internet services on a major scale.

Source: How To Make 2017 The Year Of IoT Security | Forbes

Share

Government’s Role in the Internet of Things | Cisco Blogs

Governments around the world are beginning to realize that IoT adoption will be one of the key factors defining the competitiveness of their cities, provinces, countries, or regions and that IoT can help solve many of the chronic problems plaguing their economies and their environments. Thus, governments at various levels have a number of key roles to play…

Source: Government’s Role in the Internet of Thing | Cisco Blogs

Share

Four Security Priorities Will Drive Adoption of the Industrial Internet of Things | Industry Week

The potential of the Industrial Internet of Things (IoT) is bound only by the limits of our creativity. But its realization will forever be tied to security.We’ve seen this trend play out among early Industrial IoT adopters in the oil and gas industry, where there is tremendous motivation to adopt networked technologies and smart sensors. Many oil and gas facilities, especially offshore platforms, are located in environments we call “4D” – dirty, distant, dull and dangerous. In these harsh areas, automation and remote management can increase efficiency, improve performance, and enhance profitability. But most importantly, they keep people out of harm’s way.

Source: Four Security Priorities Will Drive Adoption of the Industrial Internet of Things | Industry Week

Share

The Internet of Things Means a Big Dilemma for Big Law Discovery | National Law Journal


“In the midst of the ensuing investigation, authorities think they may have found a new witness. That potential witness, however, wasn’t one of the people having drinks that night. It was Amazon Echo, a web-connected wireless speaker that, upon voice command, can provide information on a variety of topics and music. The device is, as some users put it, “always listening,” i.e., always ready to receive a command. Upon making a request of the device, it also records under 60 seconds of sound from its surroundings, which is erased as new sound as recorded. Amazon, however, refuses to release information on customers unless legally required.”

Source: The Internet of Things Means a Big Dilemma for Big Law Discovery | National Law Journal

Share