We’re rapidly entering a new phase of technological evolution, in which pretty much everything around us is connected to the internet. The term used to describe this increasingly connected ecosystem is the internet of things (IoT), and it’s attracting the biggest names in tech, from Apple to Samsung and everyone in between.If the tech pundits are right, everything from toasters to light bulbs will soon have internet functionalities.
The Internet of things (IoT) is certainly a convenience to us all, but it’s also a pathway to chaos for cyber criminals and enemies of the United States. Eric Lieberman, technology and law reporter for The Daily Caller tells of an unnamed university that was hacked through its light bulbs and vending machines.
People who make Internet of Things (IoT) devices still aren’t getting the message on security. And as these devices proliferate, the danger of increased attacks is getting more real.Late last year, popular internet services such as Netflix and Twitter were temporarily taken down amid a massive distributed denial-of-service (DDoS) attack that involved hackers deploying malware to simple webcams that many of us use without thinking. Authorities in the U.S. and U.K. were investigating the Mirai malware used in the attack to create a botnet, an army of zombie devices commanded by hackers. In fact, the Mirai code is still available online, allowing those with only modest technical skills to continue disrupting internet services on a major scale.
Governments around the world are beginning to realize that IoT adoption will be one of the key factors defining the competitiveness of their cities, provinces, countries, or regions and that IoT can help solve many of the chronic problems plaguing their economies and their environments. Thus, governments at various levels have a number of key roles to play…
The potential of the Industrial Internet of Things (IoT) is bound only by the limits of our creativity. But its realization will forever be tied to security.We’ve seen this trend play out among early Industrial IoT adopters in the oil and gas industry, where there is tremendous motivation to adopt networked technologies and smart sensors. Many oil and gas facilities, especially offshore platforms, are located in environments we call “4D” – dirty, distant, dull and dangerous. In these harsh areas, automation and remote management can increase efficiency, improve performance, and enhance profitability. But most importantly, they keep people out of harm’s way.
“In the midst of the ensuing investigation, authorities think they may have found a new witness. That potential witness, however, wasn’t one of the people having drinks that night. It was Amazon Echo, a web-connected wireless speaker that, upon voice command, can provide information on a variety of topics and music. The device is, as some users put it, “always listening,” i.e., always ready to receive a command. Upon making a request of the device, it also records under 60 seconds of sound from its surroundings, which is erased as new sound as recorded. Amazon, however, refuses to release information on customers unless legally required.”
Connected cars are the future for the automotive industry, with more than 90 percent of vehicles expected to have built-in connectivity by 2020. But, as more vehicles link up to the internet, lawmakers are worried about their security.On Wednesday, lawmakers introduced a bipartisan bill in the U.S. House of Representatives that would direct the National Highway Traffic Safety Administration (NHTSA) to study cyber security in vehicles. Rep. Joe Wilson, R-SC, and Rep. Ted Lieu, D-Calif., co-sponsored The Security and Privacy in Your Car Study Act, which hopes to create a standard for safety in connected cars.
A consortium of researchers today announced the development of a universal, free, and open-source framework to protect wireless software updates in vehicles. The team issued a challenge to security experts everywhere to try to find vulnerabilities before it is adopted by the automotive industry.
The new solution, called Uptane, evolves the widely used TUF (The Update Framework), developed by NYU Tandon School of Engineering Assistant Professor of Computer Science and Engineering Justin Cappos to secure software updates. Uptane is a collaboration of NYU Tandon, the University of Michigan Transport Research Institute (UMTRI), and the Southwest Research Institute (SwRI), and is supported by contracts from the U.S. Department of Homeland Security, Science and Technology Directorate.
Cybercriminals will use distributed denial of service (DDoS) attacks in 2017 to extend their reach as there are now several Internet of Things (IoT) devices containing outdated codes and operating with well known vulnerabilities, a global security firm warned on Monday.
According to Sophos, global network and endpoint security firm, financial infrastructure is at greater attack risk as the use of targeted “phishing” and “whaling” continues to grow.
A security researcher claims to have established the identity of a programmer behind the code that carried out some recent crippling online attacks.Late last year, hundreds of thousands of connected devices were hacked and used to send debilitating surges of data to servers. These so-called Internet of things (IoT) botnets, made up of hardware such as Internet-connected cameras and broadband routers, were used to take down websites and Internet infrastructure. The most notable attack affected large swaths of the East Coast of the U.S.