iot | Page 9


Part I: The Problem About 4000 years ago, as we began the development of our modern way of life, people started to also want their own privacy and the ability to safeguard their possessions. The lock and key concept was created at that time. The first were made with hardwoods, then metals. Some were amazingly intricate. But eventually, they evolved to become the latest iteration of that ancient concept, something we have seen developing over the last few years: the smart lock. The key has been replaced by your smartphone or smartwatch, but the... [Read More]
by RSS David Maciejak  |  Oct 06, 2016  |  Filed in: Security Research
26 Connected Devices Per Human by 2020 Changes the Security Equation: How to Make Sure Your Network is Prepared We seem to be hearing about the Internet of Things (IOT) and the security challenges related to it everywhere these days… While there is no denying that IP-based connectivity continues to become more and more pervasive, this is not a fundamentally new thing. What is new is that the target audience is changing and connectivity is becoming much more personal. Connectivity is no longer limited to high -nd technology consumers... [Read More]
by RSS Ken McAlpine  |  Oct 04, 2016  |  Filed in: Industry Trends
The need for medical device security is growing alongside the medical device marketplace. Read this post to learn more. [Read More]
by RSS Susan Biddle  |  Sep 19, 2016  |  Filed in: Industry Trends
I’m excited to be at Protect 2016, HPE’s largest security event of the year! Over 2,000 security professionals at the event will explore an integrated approach to security and risk management, and learn how to make effective security simple. At Fortinet, we hold similar values. The modern response to increasingly challenging security issues happening in increasingly complex networked environments needs to be simplicity. As networks become more complicated, many organizations tend to keep adding new security devices to an already overburdened... [Read More]
by RSS Neil Prasad  |  Sep 12, 2016  |  Filed in: Industry Trends
Due to the sensitive information housed within medical records (social security numbers, addresses, medical claim data etc.), healthcare has always been one of the most frequently targeted industries by cybercriminals. Hackers who are able to successfully steal this data can profit in a big way as this data has high value in the cybercrime black market. As digital capabilities grow within healthcare, so too do the number of vulnerabilities. This upsurge in capabilities and targets can largely be credited to the rise of the Internet of Medical... [Read More]
by RSS Susan Biddle  |  Sep 12, 2016  |  Filed in: Industry Trends
While inspecting the Pokémon Go application, I incidentally found information on ... Pokémon Go Plus. Basically, this is the Pokémon IoT: a connected wristband with a button (to throw a pokéball, for instance), a RGB LED, and vibration capability (e.g to notify of nearby Pokémon). The device is not yet released, and the software is still under development: as you can see below, versions 0.29.x corresponds to "BETA4". Implementation in version... [Read More]
by RSS Axelle Apvrille  |  Aug 11, 2016  |  Filed in: Security Research
This is the second in a series of blogs written as a companion to my forthcoming book, RIoT Control – Understanding and Managing Risk and the Internet of Things What Are the “Things” in The Internet of Things? User-based devices that communicate, consume content, and create and publish content for other people to consume have dominated our current version of the Internet. The developing Internet of Things is about to change that. While it will include the “old” Internet of user-based devices, it is very different... [Read More]
by RSS Tyson Macaulay  |  Jul 28, 2016  |  Filed in: Industry Trends
Not too long ago, carriers had fairly straightforward options for their security: they bought one vendor’s box with the same vendor’s firewall, email filtering, and web application firewalls. Then came the dynamic duo of software defined network (SDN) and network function virtualization (NFV). NFV allows all network components to run in software on top of common “white box” hardware. By de-coupling hardware and software components, carriers have the power to virtualize services and provision on demand. This provides enormous benefits in... [Read More]
by RSS Tyson Macaulay  |  May 23, 2016  |  Filed in: Industry Trends
Recently, we - i.e Giuseppe Pacelli (student at Eurecom), Matteo Bertolino (student at Eurecom) and their supervisors Ludovic Apvrille (Telecom ParisTech) and myself - had a closer look at a few Android samples infected with the Feiwo adware. This adware family is not new, but the instances we analyzed were still undetected by all anti-virus vendors last week, as far as we know. Besides aggressively serving ads to your mobile phone, this potentially unwanted application (PUA) posts your phone number and list of applications you installed... [Read More]
by RSS Axelle Apvrille  |  May 20, 2016  |  Filed in: Security Research
Innovations in wireless and computing technology are driving the growth of connectivity between devices and appliances throughout the home, office, car, store, or practically any place that has a Wi-Fi connection. Known as ubiquitous computing, the reach of interconnected devices is widespread and ever expanding, providing opportunities for ground-breaking new services that improve safety, security, reliability, and convenience. But perhaps unsurprisingly, the growth of ubiquitous computing and network connections also creates new vulnerabilities... [Read More]
by RSS Fortinet  |  May 18, 2016  |  Filed in: Industry Trends