Google on Thursday announced it will acquire LogMeIn’s Xively IoT platform for $50 million.
Google said the deal will “complement” its Google Cloud efforts for a fully managed IoT service.
“With the addition of Xively’s robust, enterprise-ready IoT platform, we can accelerate our customers’ timeline from IoT vision to product, as they look to build their connected business,” Google wrote in a blog post announcing the acquisition.
IoT brings several security challenges with far-reaching consequences. These challenges differ from those present in more conventional technology infrastructures.
Connected devices such as smart light bulbs, refrigerators and TVs are all bound by Wi-Fi networks. But that might not be the case for much longer.
Arm, a processor design company, is unveiling a new software stack, called Kigen, that would allow SIM cards to be integrated into internet-of-things devices. That is, your smart objects could connect to the internet more like a phone, rather than being dependent on Wi-Fi. And that could be big business: The company is looking ahead to a trillion connected devices by 2035, though the cellular IoT market would be only a portion of that.
“Give me a lever long enough and a fulcrum on which to place it, and I shall move the world.” Archimedes died in 212 BC. There’s no way he could have predicted the Internet of Things. But he did.
Three unknown twenty-somethings said give us vulnerable home routers and DVR’s and we’ll take down the internet.
They nearly did with the Mirai botnet, and the trouble is just starting.
Poor cybersecurity in Internet of Things (IoT) medical devices potentially poses risks to both the well-being of patients as well as to the infrastructure that keeps hospitals running.
The Royal Academy of Engineering worked alongside the Petras Internet of Things research hub to produce a report on IoT, cyber-safety, and reliance — and the message is that more work needs to be done to improve the security of connected systems.
Now that we’ve begun the new year, it may be the best time to revisit Internet of Things (IoT) legislation (even though the relevant bills have been on the Hill since the summer).
A recently introduced bill addresses perceived vulnerabilities in the security of IoT devices sold to the federal government, and medical devices that connect to the Internet. IoT device manufacturers would also have responsibilities to ensure security over the life of the devices. The counter-argument to this legislation, however, is that disclosure and certification requirements could create additional liability for device manufacturers.
Today, each one of us is knowingly or unknowingly a protagonist in a digitally connected world. Our every move is recorded. However, instead of beaming these mundane details out to the world, our information is being used by marketers and organizations who analyse and dissect it to tailor-make their goods and services for us.
Some of this is happening with our consent.
For instance, at any given time, we have Apple’s Siri or Amazon’s Alexa with Echo or Google’s virtual assistant listening in to our conversations to do our bidding at our call.
While medical equipment has long presented thorny security problems, Internet of Things devices in hospitals bring entirely new, and often daunting, cyberthreats.
Take Mirai malware as just the latest example. In late 2017, cybersecurity experts discovered a new variant of Mirai, which transforms Linux networked devices into remote-controlled bots that can be used as part of a botnet in major network attacks. This new variant was designed specially to attack Internet of Things devices.
“The attack is a distributed denial of service attack, meaning the malware now can commandeer previously immune devices and use them to target large amounts of traffic at other devices, causing them to fail due to resource exhaustion,” explained Mike Ahmadi, global director of IoT security at DigiCert, a cybersecurity company that specializes in digital certificates, SSL, encryption and the IoT. “What is particularly onerous is that there are an exponentially larger number of devices – potentially billions – now susceptible to the malware, dramatically increasing the number of potential attacks.”
A tether or a battery? The growth of the Internet of Things (IoT) is limited by these two unsatisfying options. Have you ever wondered what provides power to all of those hotel room card key locks? It’s batteries that die and have to be changed. Most video surveillance systems are tethered, mobile phones use batteries, RFID readers are tethered, drones usage is limited by battery life, and so on. Why are smart thermostats and doorbells selling so well? It’s because the power supply is already there. Show me a source of power and I’ll show you a great IoT application.
Try to imagine what the world would be like without these constraints. Of course, we’d all love our phones to be fully charged all of the time, but wireless power has implications well beyond that. Imagine lightweight powerful lawn mowers and yard tools that just work; drones that could stay aloft indefinitely; industrial sensors that could be attached to anything, anywhere; or security systems that could be deployed quickly and easily. IoT devices would crop up everywhere, helping us in ways that we haven’t even thought of yet.