Apps and Internet of Things
2.2K views | +0 today
Follow
 
Scooped by Apptimate
onto Apps and Internet of Things
Scoop.it!

6 IoT issues that need to be solved - Smashdig

6 IoT issues that need to be solved - Smashdig | Apps and Internet of Things | Scoop.it
Apptimate's insight:

The latest blog post from apptimate.io about IoT security, highlighted by Smashdig

more...
No comment yet.
Apps and Internet of Things
Your new post is loading...
Your new post is loading...
Scooped by Apptimate
Scoop.it!

We've Been Approaching The Internet Of Things All Wrong

We've Been Approaching The Internet Of Things All Wrong | Apps and Internet of Things | Scoop.it
The smart sensor Helium has captured the interest of Silicon Valleyand the insurance industry.
Apptimate's insight:

The industrial applications of IoT might come long before the consumer products. In the industry we talk about real measurable benefits that can be quantified into $$$, But the problem is when industry try to cut corners by installing cheap consumer grade IoT devices, that do not have industrial grade security by design. Most consumer products today are extremely open and vulnerable to attacks.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

IoT a heaven for hackers

IoT a heaven for hackers | Apps and Internet of Things | Scoop.it
IBM SA's security sales leader Kevin McKerr. Those still finding it hard to envision the extent of the impact the Internet of Things' (IoT) will have on the way people live and work should try this:
Apptimate's insight:

The Internt of Attack Vectors

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

An In-Depth Analysis of How Automobiles Can Be Hacked

An In-Depth Analysis of How Automobiles Can Be Hacked | Apps and Internet of Things | Scoop.it
A new U.S. Government Accountability Office report outlines weaknesses in vehicle electronic systems that could be exploited to endanger occupants and offers ways
Apptimate's insight:

As cars get more and more digital and connected they will have to take lessons from the software industry. They should as they in fact are turning into SW-on-wheels. It is extremely important that they design the platforms with state-of-the-art security processes and architecture. It is also important to realize that cyber security is not an absolute, it is an incremental process where newly discovered 0-day vulnerabilities are patched immediately, not at the next service interval.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Why Cloud Security is essential for the success of Internet of Things | CloudWedge

Why Cloud Security is essential for the success of Internet of Things | CloudWedge | Apps and Internet of Things | Scoop.it
The integration of Internet of Things (IoT) into daily lives  is a hot topic for the consumer market with smart home appliances, smart phones and wearables
Apptimate's insight:

An end-to-end security architecture is necessary to protect privacy and data integrity in IoT, where data will flow over different networks, providers, clouds, etc.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

The Dark Side of the Internet of Things | Digit.in

The Dark Side of the Internet of  Things | Digit.in | Apps and Internet of Things | Scoop.it
Most of us are keenly aware of the potential and promise of the Internet of Things (IoT). It’s easy to visualize a bright future arising from the many adv
Apptimate's insight:

Security in the Internet of Things is significantly more complex than existing M2M applications or traditional enterprise networks. Data must be protected within the system, in transit or at rest and significant evolution is required in the identification, authentication and authorization of devices and people. We must also recognize that some devices in the field will certainly be compromised or simply fail; so there needs to be an efficient method of secure remote remediation – yet another challenge if the IoT is to live up to expectations.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

AWS vs Microsoft Azure: Understanding the serverless application trend - TechRepublic

AWS vs Microsoft Azure: Understanding the serverless application trend - TechRepublic | Apps and Internet of Things | Scoop.it
How exactly do you run applications without servers? Keith Townsend explains how AWS' Lambda service and Microsoft's Azure Service Fabric move away from the OS-centric view of computing.
Apptimate's insight:

The serverless trend means important steps towards a distributed architecture that is a necessity for the "everything connected" world with Sharing Economy, Mobility, IoT, Smart City, and all the other trendy buzzwords. But this trend also puts new requirements on security, authentication, SW distribution and upgrades, etc.  . 

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

IoT Security: It's All About the Process - eSecurity Planet

IoT Security: It's All About the Process - eSecurity Planet | Apps and Internet of Things | Scoop.it
With IoT security, complicated dependencies demand complementary processes.
Apptimate's insight:

IoT security is very much the story about the weekest link of the chain, and IoT applications will have many links in them. Knowing what and how to do is paramount, but processes might seem to increase the cost and development time.

 

True, but necessary costs. Fixing things in later product releases or having a never ending stream of security patches will not help sell your products, but actually being the cause of a breach might kill you through liability. 

 

Don't cut corners in your development. It will only hurt you in the long run. Save on features and code instead. Use verified and certified 3rd party components, tools, etc, as long as they have built for security from the start. Inhouse development isn't always better.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

The Four Concerns That Must Be Addressed Before the Internet of Things Can Really Take Off In 2016

The Four Concerns That Must Be Addressed Before the Internet of Things Can Really Take Off In 2016 | Apps and Internet of Things | Scoop.it
By 2020, there will be more than 50 billion of connected devices, according to Cisco, and experts predict that the IoT will have a $3.5 trillion impact on the global economy within the next five years. The question is, is it really going to happen? And shouldn’t we be seeing greater market penetration than we already do?
Apptimate's insight:

"The good thing about IoT standards is that there are so many to choose from" :)

The situation today in the IoT market is very much similar to the early days of mobile/cellular communication. Entrepreneurs and telcos invested billions in different standards and technologies preventing people from roaming over different states in the US, and making it impossible to roam internationally. In the end, one standard crushed the competition, GSM. Many reasons for this but I believe that the roaming abilities is a major factor, the necessity to travel extensively between the smaller European countries for day to day business.

We will see the same evolution in the IoT. Interoperability is a necessity. Industry groups will continue to push their standards that they have invested heavily in, and where they own the patent rights.

My strong belief is that the winner in this standards battle will be something Open Source. Where no single stakeholders own the right and gathers licensing fees from the application and "things" developers. This extra taxation prevents innovation.

The real killer will be the open source or "free" tech that offers interoperability, "roaming", between standards, releasing the innovation power of the application developers. While still provide necessary privacy and security protection. Interoperability, if not implemented right, will provide a massive security issue.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Internet of Things: Security Issues and Solutions | TheTechNews

Internet of Things: Security Issues and Solutions | TheTechNews | Apps and Internet of Things | Scoop.it
Internet of Things (IoT) is the network of smart gadgets that can sense, communicate and interact with each other and the external environment. In this system, smart devices are equipped with sensors, communication interface, tiny microprocessor and a power resource. The devices are connected to the Internet and can influence both themselves and the environment surrounding them by using the Internet connection. As the network gets stacked with obscure applications, security threats on the other hand increase. At present security solutions come up short as new dangers seem to destruct the reliability of data.
Apptimate's insight:

IoT security requires new technologies with new abilities, with focus on distributed applications, authentication, credentials, user and device discovery, etc, all on non-secure networks. Apptimate.io's solution provide tools to manage some of this by putting the application itself in charge of security and not trusting the network.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Vänta inte tills kunderna kräver skärpt IoT-säkerhet

Vänta inte tills kunderna kräver skärpt IoT-säkerhet | Apps and Internet of Things | Scoop.it
I en artikel i Computer Sweden tidigare i år konstaterar Cisco att säkerhet inte är, för att utrycka sig milt, en högt prioriterad fråga hos IoT-leverantörer. Cisco hade exempelvis informerat en
Apptimate's insight:

Quick summary in English.
"The suppliers and their end customers are immature and lack the insights in IoT Security challenges. Unfortunately they might not wake up until something really, really bad happens."
 
We security suppliers/professionals have an important educational task here. WE must change the mind set of the IoT suppliers, to save their customers and ultimately THEIR business.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Hackers can control an electric car from halfway around the world

Hackers can control an electric car from halfway around the world | Apps and Internet of Things | Scoop.it
And it's really not that difficult.
Apptimate's insight:

An electric car is about pioneering technology and the future. Or it should be. From a security point of view this car should have been left way back in history, where it belongs.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Internet of things security years away from being fully baked, says Forrester | ZDNet

Internet of things security years away from being fully baked, says Forrester | ZDNet | Apps and Internet of Things | Scoop.it
Forrester's take on the Internet of things isn't that shocking--the industry has developed with little thought about security--but the time frames are jarring nonetheless.
Apptimate's insight:

Even when IoT suppliers eventually get security right there will be millions of connected devices from these early years, still alive and ticking. Still opening severe vulnerabilities for many years to come.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

How IoT Disrupts Traditional Business Models — Startups & Venture Capital — Medium

How IoT Disrupts Traditional Business Models - Startups & Venture Capital - Medium
Apptimate's insight:

IoT also requires a new paradigm in IT security. IoT is not only about sensors and accessing data. It is also about controlling devices remotely. Turning off brakes on a car is the perfect remote assassination. Turning off the cooling system at a power plant will cause considerable damage, probably even casualties. 

Besides the danger to human lives, the economic impact will be huge. Just think about liability issues and extortion schemes. Hacking the Philips dishwasher and flooding the apartment is easy. Who´s fault is it? Philips? The WiFi chip provider? The SmartHomes automation SW? The Telco providing the connection? The landlord? The installation technician? Who will accept the liability, and what will they be willing to pay for not having all apartments flooded?

IoT suppliers must grow up ASAP and build in security and privacy from the start, not sprinkling it on top at the end of the project, as most do today.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

4 tips to protect digital identity in an IoT world

4 tips to protect digital identity in an IoT world | Apps and Internet of Things | Scoop.it
Everyone and everything has a unique digital identity -- from employees to customers, connected cars to drones – that leaves plenty of data floating around the Internet. Here are four scenarios on how to keep that data safe.
Apptimate's insight:

It's really kind of simple and logical. Everything is a user with assigned credentials, that needs to be authenticated and given roles. Then it's just a matter of encryption and application security to make everything secure. Simple, it sounds, a bit more complicated to realize. 

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Mobile, IoT yet to become data breach targets

Mobile, IoT yet to become data breach targets | Apps and Internet of Things | Scoop.it
This story was delivered to B
Apptimate's insight:

Mobiles and IoT devices are not the most common security hole. Yet. With the massive roll-out of insecure first generation IoT devices we will soon see them used as entry-points in much more severe breaches.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Why the Internet of Things is the next target for ransomware | ZDNet

Why the Internet of Things is the next target for ransomware | ZDNet | Apps and Internet of Things | Scoop.it
Devices from pacemakers to cars could be rendered useless by ransomware infections, warns a think tank.
Apptimate's insight:

Ransomware soon coming to you car, home and medical device.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

IDG Connect – The Connected Car: An accelerating cyber security issue?

IDG Connect – The Connected Car: An accelerating cyber security issue? | Apps and Internet of Things | Scoop.it
A look at the issues surrounding driverless cars
Apptimate's insight:

IoT security is very much an identity and authentication issue.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Security experts: what's wrong with Internet of Things security, and how to fix it - TechRepublic

Security experts: what's wrong with Internet of Things security, and how to fix it - TechRepublic | Apps and Internet of Things | Scoop.it
From malware to eavesdropping, millions of connected devices around the world are vulnerable to attacks. Two security analysts explain how the IoT can be hacked, how to protect yourself.
Apptimate's insight:

IoT Security, what to think about today.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

When Will We Be Able to Trust the Internet of Things?

When Will We Be Able to Trust the Internet of Things? | Apps and Internet of Things | Scoop.it
Regardless of all the buzz around the Internet of Things, the promised connectivity won't mean much until it works all the time.
Apptimate's insight:

IoT must be robust, maintained, updated, patched, secure, etc before we will trust it. What users really expect, is that devices and applications just "disappear" from view. It should just work. They don't even want to change batteries.

 

And the responsibility will be owned by the application that the user buys. 

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Creating secure devices for the Internet of Things - Help Net Security

Creating secure devices for the Internet of Things - Help Net Security | Apps and Internet of Things | Scoop.it
The Internet of Things (IoT) and subsequent explosion of connected devices have created a world of opportunities we might never have anticipated. But have
Apptimate's insight:

Besides the described design constraints there are some more:

1. Many IoT devices will be battery powered, so they will stay asleep as much as possible to save energy.

2. Communication will go over non-secure public networks. The security must be provided by the IoT device and the applications themselves.

3. Product LIfe Cycle Management. People will install and forget the device. What happens at Product End of Life? Think about the problems ancient Windows XP is causing and the never ending problems with old versions of Internet Explorer still in use.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Software security needs a new perspective

Software security needs a new perspective | Apps and Internet of Things | Scoop.it
Source code bugs have been a constant in the software industry since the dawn of computers -- and have ever been a major source of attacks, exploits and..
Apptimate's insight:

A good approach to secure and robust source code is utilizing open source and verified mature 3rd party code. Code that has been tested and scrutinized by thousands of developers has a greater chance of being less insecure. Take for instance the security holes in OpenSSL. Sure, a lot of projects where vulnerable because of the bugs, but when it was discovered it was fixed much, much faster than if it would have been with an in-house development by a single supplier, because of the the public attention to it. Thousands of qualified developers adds many different test cases and some might even use the suggested tools and methods.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

"Libotr" Library Flaw Exposes Popular IM Apps | SecurityWeek.Com

"Libotr" Library Flaw Exposes Popular IM Apps | SecurityWeek.Com | Apps and Internet of Things | Scoop.it

A serious vulnerability in the “libotr” library exposes popular chat apps such as Pidgin, Adium and ChatSecure to attacks

Apptimate's insight:

A software component for encrypting popular instant messaging clients has a flaw that could let attackers take over users' machines, but there's now a patch for the vulnerability.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Car Industry Three Years Behind Today’s Cyber Threats

Car Industry Three Years Behind Today’s Cyber Threats | Apps and Internet of Things | Scoop.it
Researchers say when it comes to car hacking it's going to take three years for automakers to catch up with the number cyber threats targeting cars.
Apptimate's insight:

The automotive industry have to realize that they are now in the mobile and software industries and that a normal product life cycle of three years must be completely changed. Software requires agile methods and incremental releases, pushing security patches etc on a weekly basis. Like Microsoft does.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

2016 State of Application Security: Top Health Care Apps in Critical Condition

2016 State of Application Security: Top Health Care Apps in Critical Condition | Apps and Internet of Things | Scoop.it
A recent study found that application security among health care apps was in critical condition. Are there measures to save these mobile medical programs?
Apptimate's insight:

It's time to start taking security seriously! And it is neither hard or expensive if you chose the right tools in your development. Take a look at https://apptimate.io for securing your communication.

more...
No comment yet.
Scooped by Apptimate
Scoop.it!

Experts: Privacy and security must be 'baked in' as IoT grows

Experts: Privacy and security must be 'baked in' as IoT grows | Apps and Internet of Things | Scoop.it
Speaking during a panel at CES Wednesday, a number of government officials and private sector experts say privacy and security need to baked into the design of products from their inception.
Apptimate's insight:

The IoT startup scene is waking up to the security threats they introduce with their new products. That is a very positive sign, but there is still a long way to go before the whole IoT ecosystem is secure. What about; Product Life Cycle Management, Interoperability, Secure access over insecure networks, etc.

more...
No comment yet.