internetofthings

‘Ban These Chinese Routers NOW,’ Cries House Committee
Richi Jennings | | Attacking Routers, china, China-linked Hackers, Chinese, Chinese Communists, Chinese devices, chinese government, Chinese hardware, Chinese state-sponsored cyberattacks, Commerce Department, Congress, Consumer IoT, flawed routers, House of Representatives, Internet of things, Internet of Things (IoT), Internet of Things cyber security, internetof things, internetofthings, internte-of-things, iot, Jeff Barney, John Moolenaar, OpenWrt, Peoples Republic of China, Raja Krishnamoorthi, Rob Joyce, router compromise, router exploit, router firmware security flaw, router hacking, router hijacking, router security, router vulnerabilities, SB Blogwatch, SOHO, SOHO and IoT device vulnerabilities, TP-LINK, U.S. Commerce Department, US Congress
Sino stoppage scheme: TP-Link in crosshairs, along with other brands ...
Security Boulevard

Insecure Medical Devices — Illumina DNA Sequencer Illuminates Risks
Richi Jennings | | biomedical, biomedical devices, commercial iot security, DNA, DNA Data, Family Tree DNA, Hackable Medical Devices, industrial internet of things, Internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, internetof things, internetofthings, internte-of-things, Intranet of Things, iot, medical, medical data, medical device, medical device security, Medical Devices, Medical devices cyber security, medical equipment, Ransomware, Ransomware of Things, SB Blogwatch, secure boot
IEI-IEI, Oh: Running an obsolete OS, on obsolete hardware, configured with obsolete settings ...
Security Boulevard
Securing the International IoT Supply Chain
Bruce Schneier | | academicpapers, Cybersecurity, hardware, internetofthings, securitypolicies, supplychain
Together with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. The basic problem we try to solve is: ...
Analyzing IoT Security Best Practices
New research: "Best Practices for IoT Security: What Does That Even Mean?" by Christopher Bellman and Paul C. van Oorschot: Abstract: Best practices for Internet of Things (IoT) security have recently attracted ...
Security in 2020: Revisited
Ten years ago, I wrote an essay: "Security in 2020." Well, it's finally 2020. I think I did pretty well. Here's what I said back then: There's really no such thing as ...
Lousy IoT Security
DTEN makes smart screens and whiteboards for videoconferencing systems. Forescout found that their security is terrible: In total, our researchers discovered five vulnerabilities of four different kinds: Data exposure: PDF files of ...
Measuring the Security of IoT Devices
In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software. Data Collected: 22 Vendors 1,294 Products 4,956 Firmware versions 3,333,411 Binaries ...
Zipcar Disruption
This isn't a security story, but it easily could have been. Last Saturday, Zipcar had a system outage: "an outage experienced by a third party telecommunications vendor disrupted connections between the company's ...
The Latest in Creepy Spyware
The Nest home alarm system shipped with a secret microphone, which -- according to the company -- was only an accidental secret: On Tuesday, a Google spokesperson told Business Insider the company ...
Security Flaws in Children’s Smart Watches
A year ago, the Norwegian Consumer Council published an excellent security analysis of children's GPS-connected smart watches. The security was terrible. Not only could parents track the children, anyone else could also ...