Canada’s plan to build a 5G network, which could be in place around 2020, has come into sharp focus in recent months, following the arrest by Canadian authorities of a high-level executive at China’s Huawei Technologies. Ottawa is now under increasing pressure to block Huawei from developing its 5G technology in Canada, as experts warn it would present a national security risk.
But what are 5G networks exactly? And why the security concerns? Here, we give you a (very) brief explainer on what 5G is, and why it matters:
Canonical unleashed Ubuntu Core 18 on the public today following a beta of the locked-down Linux in December.
Ubuntu Core is Canonical’s pitch at the IoT and embedded market and brings the company’s Ubuntu 18.04 LTS, released back in April 2018, to devices that prefer stability to life on the bleeding edge.
Enthusiasts may wince, however, as many packages have been removed from the core operating system in order to minimise the attack surface. The less-is-more principle also applies to updates – Canonical reckons that by stripping away the chaff, the size and frequency of patches should be reduced as well.
Internet of Things has established itself as the technology that is out to connect the world across industries across the globe.
No matter what Tech Trend Report you take up for 2019 and beyond, IoT mobile app will be present everywhere in every popular technology trend list promising a world that is connected with each other. And would be prepared to present opportunities that are aimed at bringing the control of every machine and device that a user works with on their smartphone.
The demand that the IoT mobile app industry is witnessing has presented a positive sentiment driven outlook for the technology, which in turn have given birth to the statistics presented below, showcasing the technology’s rise –
By 2030, the world is expected to have 43 megacities that host more than 10 million inhabitants, while by 2050 it is likely that 68 % of the world population will live in urban areas, according to a UN report. With continued urbanisation, successful management of cities has become more important than ever. Thanks to its potential to improve the quality of life in areas ranging from energy and environment to transportation and healthcare, the concept of smart cities is increasingly becoming popular.
Robert Bosch, the world’s biggest auto parts supplier, is plunging deeper into a new world of Internet-based technologies and vehicle services in a bid to remake itself as what it calls “an IoT company.”
The supplier of parts ranging from humble spark plugs to electric vehicle powertrains believes there is an enormous opportunity beckoning with billions in business from such new technologies — even if many consumers don’t understand what the term “IoT” means.
On Monday, Bosch launched a new IoT identity campaign here at the kickoff of the global electronics trade show, CES 2019. The new public relations effort, built around an advertising theme called “Like a Bosch,” will attempt to present the old German company in a cheerful and humorous light as a purveyor of Internet solutions, including vehicles that communicate with their owners and with other vehicles.
The use of malicious software to attack IoT devices like smart home security monitoring systems is rising substantially and growing more sophisticated as cyber criminals take advantage of lax security, Nokia’s Threat Intelligence Report 2019 warned on Tuesday.
Driven by financial and other nefarious purposes, IoT botnet activity accounted for 78% of malware detection events in communication service provider (CSP) networks in 2018, according to the report, which is based on data aggregated from monitoring network traffic this year on more than 150 million devices globally where Nokia’s NetGuard Endpoint Security product is deployed.
That is up sharply from 33% in 2016, when IoT botnets were first seen in meaningful numbers. A botnet is a system of computers that can be infected with malicious software and controlled by a single computer for doing things like stealing bank account information and shuttering web sites.
The Internet of Things (IoT) has the potential to revolutionise the way companies across various industries carry out their business, and organisations are rapidly getting on board. According to an IDC survey, over half of respondents said they intended to do something within IoT in the next twelve months, although the data also showed that current adoption is low.
Manufacturing has been picked out by many experts as one of the industries set to benefit significantly from IoT. The industry has reacted accordingly, being forecast to spend big on the Industrial Internet of Things (IIoT) this year. Making the most of these capex dollars, however, is another matter. Manufacturers may have many qualities, but the variety of specialist skills needed to successfully design, deploy and manage an IoT solution are ones they’re not likely to possess. For those manufacturers looking to take advantage of increased productivity, reduced wastage and real-time insight, all is not lost; within the channel there are a number of partners who can fill the manufacturer’s skills gap and help them to take advantage of Industry 4.0.
The “Internet of Things” has created all sorts of problems on the cybersecurity front — and the problem may get worse soon.
The Internet of Things, commonly called IoT in tech circles, is the concept of conventional, physical objects being linked to the internet and communicating with each other — think, for instance, of automobiles or appliances that are linked to the internet.
But just like computers that are connected to the internet, those networked devices can be hacked.
A House lawmaker wants federal agencies to prioritize cybersecurity when buying internet-connected devices.
The Internet of Things Federal Cybersecurity Improvement Act, which Rep. Robin Kelly, D-Ill., plans to introduce next week, would require all internet-connected devices purchased by the government to meet a set of basic cybersecurity standards. The bill would also pressure agencies to avoid using so-called lowest technically acceptable price criteria when choosing vendors for those devices.
Under the legislation, the government could only buy devices that accept security patches and allow users to change passwords. Vendors would also need to notify agencies of any security vulnerabilities they discover and issue software update as new threats arise.