iot | Page 10

Summary In March 2015, a Network Configuration Leak vulnerability was disclosed to Ring as part of FortiGuard's Responsible Disclosure process. The vulnerability existed on their first internet-connected doorbell, Doorbot v1.0 but other posts on the subject show that the vulnerability was ported on newer versions of the connected doorbell as well. The vulnerability had been granted CVE-2015-4400: DoorBot Network Configuration Leak. We have issued an Advisory and IPS signatures (DoorBot.Network.Configuration.Leak) for the same. We... [Read More]
by RSS Ruchna Nigam  |  Jan 22, 2016  |  Filed in: Security Research
For the 18th edition of the Association of Antivirus Asia Researchers conference, we flew to Da Nang in the beautiful country of Vietnam. Every major security vendor was present, not only those from Asia. After two full days of presentations, we would like to call out the briefings we enjoyed the most. I would say as usual that Mikko Hypponen from F-Secure gave a good talk about Securing Our Future, reaffirming that our job is to protect users globally and that the key for that is to work altogether. That means not... [Read More]
by RSS David Maciejak  |  Dec 09, 2015  |  Filed in: Industry Trends
(Author's disclaimer: I originally pitched this as a humor piece, but the more I wrote, despite the light-hearted tone, the more serious I realized this is/was/will be.)  In Chapter II of Lewis Carroll's Alice in Wonderland, Alice, having eaten a small cake labeled "Eat Me" but with no other instructions or advisories, finds herself growing so tall that she considers communicating with her feet by mail, using the address:     Alice's Right Foot, Esq.        Hearthrug,    ... [Read More]
by RSS Daniel Dern  |  Sep 24, 2015  |  Filed in: Business and Technology
The internet is built on a flawed design – this is actually well known. The whole network security industry grew because of this weak foundation. Let's not build the Internet of Things (IoT) on yet another flawed design.  The number of connected devices is growing quickly. Some experts estimate that there will be nearly 50 billion connected devices by 2020. A network of compromised IoT devices can be misused for DDoS attacks, cyber warfare, spying, reconnaissance, spreading malware, coordinating advance persistent... [Read More]
by RSS Hemant Jain  |  Jul 20, 2015  |  Filed in: Industry Trends
Recently, Beam Technologies announced it would be creating a dental insurance around its connected toothbrushes. Nest also announced it was teaming up with another insurance company, American Family. As a matter of fact, for the better and the worst, this is exactly the kind of connection which is going to raise interest in hacking and/or infecting connected objects. Insurance Fraud. Imagine a fire started at home because one of your halogen lamps set fire to your curtains in the dining room. But you'd rather blame an issue with your oven... [Read More]
by RSS Axelle Apvrille  |  Jul 09, 2015  |  Filed in: Industry Trends
Organizations often allow the use of social media on their networks, but RSAC is buzzing about the risks. Does your organization allow employees to access social media at the office? Many do, whether for strictly personal use, communication, collaboration, or marketing. There is a fair body of both anecdotal and research-based evidence that suggests opening up social channels at work keeps employees happier and more productive. Frankly, with the ubiquity of smartphones, employees are using social networks whether your policies prevent it or not. Employer... [Read More]
by RSS Chris Dawson  |  Apr 27, 2015  |  Filed in: Industry Trends
Tucked deep in the Pacific Northwest, there is a global battle being faught. The battle is over the world’s data and no company is safe. But as Digital Strategy Director, Jonas Tichenor shows us, there is a team of hackers and analysts detecting, analyzing, and stopping attacks, sometimes before they start! [Read More]
by RSS Jonas Tichenor  |  Apr 20, 2015  |  Filed in: Business and Technology
Recently, I wrote about the three vectors of a healthcare cyber attack. This is the third of a three-part series examining each vector in depth with some new perspectives here at HIMSS. Recently, I’ve been writing about the three vectors of a healthcare cyber attack. Last week, I introduced the idea of the Internet of Medical Things when I talked about connected medical devices. These devices sit in hospitals and doctors’ offices, clinics and nursing homes. They range from IV pumps to CT scanners. They are, however, just the tip of... [Read More]
by RSS Ryan Witt  |  Apr 16, 2015  |  Filed in: Industry Trends
Recently, I wrote about the three vectors of a healthcare cyber attack. This is the second of a three-part series examining each vector in depth. Over the past couple of months, I’ve written about the three vectors of a healthcare cyber attack. Most recently, I looked in depth at the first vector, what we usually think of as “traditional attacks and malware”. These sorts of attacks continue to make headlines, but as healthcare evolves and increasing numbers of medical devices begin feeding data directly into health information... [Read More]
by RSS Ryan Witt  |  Apr 10, 2015  |  Filed in: Industry Trends
Love it or hate it, the Apple Watch, introduced last fall and fully unveiled at a press event yesterday, signals the mainstreaming of wearables specifically, but, more importantly, the Internet of Things (IoT) in general. It wasn’t just the Apple Watch that the company announced yesterday, either. They also announced ResearchKit, an open source framework for collecting data that leverages the ubiquity of iOS to collect medical research data at scale. This all comes after last week’s Mobile World Congress in Barcelona where connected... [Read More]
by RSS Jonas Tichenor  |  Mar 10, 2015  |  Filed in: Industry Trends