Internet of things: security concerns over cheap IoT toys and gadgets | Lovemoney

Internet of Things (otherwise known as IoT) devices have seen a huge rise in popularity in recent years.

In a bid to satisfy the consumer craving for convenience and connectivity, manufacturers have been aggressively adding wireless connectivity to their entire product line.

We’re living in a world where fridges come with WiFi, cars with Twitter and toothbrushes with Bluetooth are widely available.

Whenever a big name manufacturer releases a new “smart” or “connected” product, researchers like myself are drawn to investigating the potential security and privacy issues that device may have.

For the most part, these manufacturers are pretty good at responding to any concerns and fixing issues fairly quickly.

Source: Internet of things: security concerns over cheap IoT toys and gadgets | Lovemoney

Share

IoT Security Flaw Leaves 496 Million Devices Vulnerable At Businesses: Report | CRN

 

 

 

 

 

Nearly a half-billion Internet of Things devices are vulnerable to cyberattacks at businesses worldwide because of a 10-year-old security flaw, according to a new report from a security software vendor.

The report was published Friday by Armis, a provider of Internet of Things security software for enterprises that focuses on detecting threats in IoT devices at workplaces. The Palo Alto, Calif.-based company has previously made security disclosures, including the BlueBorne malware attack that impacted 5 billion IoT devices.

The web exploit in question is called DNS rebinding, an attack first disclosed at the RSA Conference in 2008 that allows an attacker to bypass a network firewall and use a victim’s web browser to access other devices on the network. The attacker can gain access to the web browser through a malicious link enclosed within an email, banner ad or another source. This can leave devices susceptible to data exfiltration, compromise and hijacking, the latter of which could lead to a botnet attack similar to the Mirai malware that took down major websites in 2016.

Source: IoT Security Flaw Leaves 496 Million Devices Vulnerable At Businesses: Report | CRN

Share

Bringing Collective Intelligence to The Industrial Internet of Things Makes Devices Compute | Forbes

 

Since the advent of computers, the languages have been designed to facilitate communications between people and computers. But the landscape has changed and in the age of the Industrial Internet of Things (IIoT) that approach simply doesn’t cut it. What is now required is a software language that allows both machine to machine and machine to computer communications.

That is exactly what Atomiton has achieved with its Thing Query Language (TQL). Its software is currently used in oil and gas, smart cities, agriculture and industrial automation. The San Jose, California-based industrial software company was founded five years ago by Jane Ren, who in her previous role had been one of the original founders of GE’s digital arm. The plan is to create an operating system, or stack as Ren prefers to call it, that allows machines, equipment or devices to talk to each other and that is programmable.

Source: Bringing Collective Intelligence to The Industrial Internet of Things Makes Devices Compute | Forbes

Share

So you’re doing an IoT project. Cute. Let’s start with the basics: Security | The Register

The Internet of Things is going to solve climate change, fix our political system, and ensure that you can always find a parking spot. Some see a future of 15 billion connected devices.

Now, just the tiny matter of deploying them. There’s a long way between all IoT’s utopian promises and the reality. We’ve never attempted anything like this before.

The challenges are immense. How do those devices work autonomously? How do they work together? How do you balance the energy overhead of sending data from a low-powered sensor against processing it locally? What’s the best format for your data and how can you use it when it arrives back at base?

Source: So you’re doing an IoT project. Cute. Let’s start with the basics: Security |The Register

Share

Will China dominate the global Industrial Internet of Things market? | Information Age

Will China dominate the global Industrial IoT market? image

The Greater China region is poised to lead the global Industrial IoT (IIoT) market. This is based on an in-depth report based on interviews with mobile operators including; Asia Pacific Telecom Group, China Mobile, China Telecom, China Unicom, Far EasTone and Taiwan Mobile. The operators outline how the combination of fast internet speeds, data analytics, artificial intelligence (AI) and the IoT is transforming the region’s industrial sector.

GSMA Intelligence estimates that there will be 13.8 billion IIoT connections globally by 2025. Greater China accounts for approximately 4.1 billion of these connections or a third of the global market.

Source: Will China dominate the global Industrial Internet of Things market? Information Age

Share

Crypto Case Study: Internet of Things – Crypto Disrupt

Over the past decade, there have been an increasing amount of connected devices making up the internet of things (IoT). This network provides increasing benefits by connecting devices and people around the world and collecting data which can be used to personalize products and services. The lack of transparency in current IoT platforms brings into question data security and privacy, which continue to be significant issues in light of GDPR laws enacted across Europe. As increasing amounts of data are collected on centralized platforms, data storage costs will increase and ultimately become inefficient to handle.

Source: Crypto Case Study: Internet of Things – Crypto Disrupt

Share