Internet-of-Things

The Internet of Insecure Things

The Internet of Insecure Things

At this year’s TNW Conference, cyber-war veteran, Mikko Hypponen, spoke about the dangers and benefits of living in a smart device-centric world; the Internet of insecure things: 1) Exploitation of device vulnerabilities in the WannaCry epidemic is the perfect example of the biggest issues with IoT devices; 2) Blockchain is just a way to structure data. But blockchain has only just begun to be...

HomePod, Echo, Google Home: How Secure are These Smart Speakers?

HomePod, Echo, Google Home: How Secure are These Smart Speakers?

Apple's HomePod, Google Home and Amazon Echo all encrypt the voice recordings sent to their respective servers. But there are varying degrees of how they keep the data secret. Each Google Home requires an account tied to it, but it's possible to create dummy accounts that wouldn't have all your personal information. That's different from the Echo, for which you need an Amazon account -- which has...

  • More at CNet
  • |
  • |
Bruce Schneier on Dangers of IoT: 'We're Building a World-Sized Robot'

Bruce Schneier on Dangers of IoT: 'We're Building a World-Sized Robot'

The queue to see Bruce Schneier snakes round the conference hall at Infosecurity Europe 2017, with many attendees clutching copies of his book "Data and Goliath" in their hands, hoping to get a mark of ink from the so-called "security guru". His gospel comes at breakneck pace, warning about the inevitable dangers of the Internet of Things (IoT) technology. He believes the swarm of devices is...

Armis Wants to Rectify the IoT Security Issues

Armis Wants to Rectify the IoT Security Issues

Connected devices are designed to connect wirelessly, without corporate oversight or control. This creates a dynamic, ever-expanding matrix of connections that not only boosts employee productivity and business efficiency but simultaneously flies under the radar of security. So, if you’re a business leader, you have a conundrum. All those connected devices lead to a variety of new security...

Path for a Better Wearables Security

Path for a Better Wearables Security

The Commonwealth Scientific and Industrial Research Organisation (CSIRO) have invented a new layer of security for wearables, by tracking the way the owner walks and recognizing slight alterations in the style. The team also figured out a way to harvest energy from hand movement and feed it back to the wearable, potentially extending the battery life when on the move. The security layer still...

Avast Forewarns Against IoT Cyberattacks

Avast Forewarns Against IoT Cyberattacks

The IoT industry — which includes smart home technology — is growing at an alarming rate. In fact, a recent forecast predicted the IoT market will reach $267 billion in spending by 2020. IoT devices aren’t just in homes, they’re also in vehicles, businesses, factories, health-care centers and more. They are truly integral to modern society. But Avast, a popular security firm, warns that...

Numerous Internet of Things Devices Remain Vulnerable Post Mirai Botnet

Numerous Internet of Things Devices Remain Vulnerable Post Mirai Botnet

The rapid increase in the number of Internet of Things (IoT) devices such as smart TVs and smart speakers poses a threat to users’ privacy and security. While PCs and desktops can have antivirus protection, built-in security systems, encryption, and passwords to protect data, no such system has been devised for smart devices. The attention to security protocols on such devices was brought on by...

The Internet of Messy Things

The Internet of Messy Things

Some internet of things (IoT) devices are enjoyable and useful. Devices such as Amazon Echo and Google Home are for everyday use. For example, both devices are always listening to you. The bigger concern, however, is that ordinary gadget that are now listening in. For example, a Vizio smart TV has recently started tracking the viewing habits of the users and sharing this information with...

Amazon Echo Look Is Fun...Until It Gets Hacked and Exposes Your Nudes!

Amazon Echo Look Is Fun...Until It Gets Hacked and Exposes Your Nudes!

Amazon Look is an interesting product. Dubbed 'a hands-free camera and style assistant', the Amazon Echo Look is Amazon's newest way to get you to use Echo. The vertical camera device takes a selfie to see if what you are wearing looks ok. Think Cher from Clueless's fashion computer wardrobe and you're about right. Theoretically, Amazon could now - thanks to machine learning - potentially know if...

Five Things that Every IoT Device Owners Should Know

Five Things that Every IoT Device Owners Should Know

Internet connected devices attract maximum users due to its cozy features. It is fun to use IoT, but at the same time it is also important to take suitable security measures. Leaving IoT devices unsecured is equivalent to leaving our home unlocked. Here are five important things that every IoT device owner should know to protect their devices. 1) Don’t connect your devices unless it is...

A Carpe Diem Moment for the Internet of Things and Cybersecurity

A Carpe Diem Moment for the Internet of Things and Cybersecurity

While we are all still in the early stages of a networked, always-on Internet of Things (IoT) world, this is the precise time to develop crucial and effective cybersecurity solutions to combat growing threats. The developing ecosystem needs new ideas for bold government actions, particularly to reduce the risks of quantum computers. The news about quantum computers just keeps coming. Reports from...

  • More at AFCEA
  • |
  • |
Aga Application 'Could Let Hackers Turn off Oven'

Aga Application 'Could Let Hackers Turn off Oven'

Ken Munro of Pen Test Partners was thinking of upgrading his Aga when he found vulnerabilities in the apps used to control the newest models. It means ovens could be turned on or off, though not in a way that makes the cookers dangerous. Aga has said it has contacted the third party that provided the system. "If you were maliciously motivated, it wouldn't be very difficult to switch off people's...

  • More at BBC
  • |
  • |
Hacked Domestic Routers Trying to Brute Force Their Way into WordPress Websites

Hacked Domestic Routers Trying to Brute Force Their Way into WordPress Websites

Security researchers at Wordfence first determined that something noteworthy was happening when they witnessed an unusual spike in attacks originating from Algeria against its customers’ WordPress websites. Looking deeper into what was happening, the researchers discovered that the attacks were being launched from more than 10,000 IP addresses. 97% of the attacking IP addresses found in the...

IoT: The Internet of Things or the Internet of Troubles

IoT: The Internet of Things or the Internet of Troubles

Organizations are increasingly embracing the Internet of Things (IoT), where business technology is connected to physical assets. However, this convergence will create a potential tsunami of security challenges if not properly addressed. Many of these sensors and devices lack the proper hardware and software to meet burgeoning security demands. Novel types of attacks and new cybersecurity...

Travel Routers, NAS Devices Among Easily Hacked Internet of Things Devices

Travel Routers, NAS Devices Among Easily Hacked Internet of Things Devices

Jan Hoersch, an IT security consultant at Securai GmbH, a small pen-testing firm based in Munich, described vulnerabilities that affected off-the-shelf IoT devices such as travel routers and retinal scanners in a talk at Kaspersky Lab’s Security Analyst Summit. He started off his talk Tuesday by dissecting a travel router, M5250, made by TP-LINK, warning the device’s admin credentials can be...

Internet of Things Need Embedded Cryptography

Internet of Things Need Embedded Cryptography

For the IoT, authentication ensures that devices are interacting with authorized gateways and cloud services and they in turn verify they are working with authentic IoT nodes. The sender will use a hashing algorithm and shared secret keys to generate a tag known as a message authentication code (MAC). The receiver performs the same hashing algorithm to decode. The current state-of-the-art hashing...