Week In Review: Auto, Security, Pervasive Computing


Security The U.S. government agencies put out a warning that Russian military has been using a Kubernetes cluster to attempt distributed and anonymized brute force access against hundreds of government and private sector targets worldwide. Department of Homeland Security (DHS)’s Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National S... » read more

Strategic Principles For Securing The Internet Of Things (IoT)


Source: U.S. Department Of Homeland Security. Version 1.0 Dated: 11/15/16 "The growth of network-connected devices, systems, and services comprising the Internet of Things (IoT) creates immense opportunities and benefits for our society. IoT security, however, has not kept up with the rapid pace of innovation and deployment, creating substantial safety and economic risks. This document expla... » read more

Making Secure Chips For IoT Devices


Chips and modules going into Internet of Things node devices must have cybersecurity features designed and built into them. Multiple vendors are responding with products meant to keep the IoT devices protected from the cyberattacks that are becoming more common. While [getkc id="76" kc_name="IoT"] privacy remains a key concern for consumers and homeowners, IoT security has taken on top-of-mi... » read more

What’s Next For IoT Security?


By Ed Sperling & Jeff Dorsch With security, the little things can cause as much of a problem as the big things. As shown in the recent distributed denial of service attack (DDoS) on Dyn, which created waves of attacks using Mirai malware, connected devices of all sizes can be amassed into an army of bots that can bring even giants like Amazon and Netflix to a dead stop. This attack was ... » read more

The Race To Secure The Car


A shift is underway in the automotive industry to connect cars to each other and to a variety of communications infrastructure, adding many of the features that consumers now expect in mobile devices as well as some new ones that ultimately will lead to autonomous vehicles. But along with those changes are some nagging questions about just how safe that technology will be for consumers and othe... » read more

The Next Big Threat


In just the past year, tens of millions of Target store customers had their customer and credit card records stolen, The New York Times and The Wall Street Journal were hacked, Adobe software had a security breach, Yahoo! was infected with malware, and Snapchat was hit with a bug that exposed user phone numbers. And this was just what was reported in the mainstream media. The threat, it turns o... » read more