Ernest Worthman blogs


» read more

Data Security Takes Front Seat In Industrial IoT Design


As recently as 10 years ago, protecting Internet of Things (IoT) data was largely an afterthought. Engineers designing IoT and industrial IoT (IIoT) networks were more concerned with ensuring their applications functioned according to design specifications, not with the unintended consequences of releasing potentially sensitive information into the cloud. Today, with billions of sensors an... » read more

Apple Vs. FBI, Take Two


Well, it is now old news that the FBI has found a way to retrieve data from the iPhone of deceased terrorist Syed Farook without the cooperation of Apple. It's not surprising that the FBI succeeded here. All security can be breached. It's just a question of how much effort people are willing to expend for a given result, and what the repercussions are if you get caught. In this case, there w... » read more

Oh, The Hypocrisy


It's almost impossible to find anyone hasn’t heard about the privacy case chest-thumping going on between Apple and the FBI, as well as a few other federal entities. And by now the interview with Tim Cook and David Muir is quite public, as well. So how come, all of a sudden, Apple, Microsoft (although Bill Gates did come out on the government side) Google, Yahoo, Facebook, and countless ot... » read more

IoE Things Are Spying On Us


Special inaudible sounds are being embedded in Web pages and television commercials. In India, a company called SilverPush embeds short, ultrasonic sounds into television commercials and Web pages. Not only that, complementary software is being snuck onto computers, tablets, and smartphones. This software will pick up these “inaudible” signals and, via cookies, send what it learns back t... » read more

Scare Of The Month: The Breach At Juniper


Details are sketchy, but it was definitely a back door hack of Juniper. That almost always points in the direction of an inside job. So far, no one quite knows how exactly the hack was accomplished. But what scares me is that, supposedly, this code has been in the system for three years already. Drilling down a bit, it turns out there was more than one back door. One of them allowed ... » read more

Scare Of The Month: Whitebox Cryptography


A debate has been raging for some time about whether hardware is more secure than software. This story should provide plenty of fuel for debate. A few years ago, something called White Box Cryptography (WBC) was developed. This is a rather novel approach that attempts to implement cryptography algorithms in software, rather than hardware. The idea is to keep the cryptographic assets secure a... » read more

Things You Can Control While Sleeping


Because the IoE is just a rather vague and fluid concept right now, it is easy for just about anyone to define all or part of it in almost any fashion they desire. But some things do have a basis. For example, if you take a look at the consumer trends, as has been the case for years, you can glimpse what is happening in various segments throughout the IoE and, to some degree, where they are hea... » read more

The Danger Of Denial


For years now, my diehard Mac-lover friends and this diehard PC fan have bantered back and forth about the superiority of one processor over the other. When Apple switched to the Intel platform in the late 2000s the argument went moot. I was right, they were wrong. PC’s were the best computers. Since then, the arguments about which platform is better have died off. They both do the job, a... » read more

The Growing Price Of A Click


I have been staring at computer screens for a long time. I remember when AOL was the biggest thing to come along since 16-bit computing. I have always been an anti-spam/junk advocate. With snail mail, I could just pitch it. With radio and TV ads, I could turn down the volume or switch channels. But it got impractical to walk away from my computer every time an ad popped up on a new page. So ... » read more

← Older posts