Smart Cities & The Internet of Things (IoT)
14.1K views | +0 today
Follow
Smart Cities & The Internet of Things (IoT)
Our world is urban: cities will be smarter, with informatics, open data networks, sensors and services
Your new post is loading...
Your new post is loading...
Scooped by Judy Curtis / SIPR
January 23, 2018 9:09 PM
Scoop.it!

A New Way to Track Down Bugs Could Help Save IoT

A New Way to Track Down Bugs Could Help Save IoT | Smart Cities & The Internet of Things (IoT) | Scoop.it
New research advances techniques for finding and exploiting known vulnerabilities in IoT devices automatically.
Judy Curtis / SIPR's insight:
The threat of automated IoT vulnerability finders is a genuine concern. "Absolutely it is coming," says Anders Fogh, a malware analyst for the German security firm GData. "We are waiting for the vendors to realize that security is relevant. They need a dose of bitter medicine." Other researchers are beginning to work on large scale IoT firmware analysis and automatic n-day mining projects as well, acknowledging a future in which attackers can fully exploit IoT vulnerability.
Judy Curtis / SIPR's curator insight, February 14, 2018 5:36 PM
The threat of automated IoT vulnerability finders is a genuine concern. "Absolutely it is coming," says Anders Fogh, a malware analyst for the German security firm GData. "We are waiting for the vendors to realize that security is relevant. They need a dose of bitter medicine." Other researchers are beginning to work on large scale IoT firmware analysis and automatic n-day mining projects as well, acknowledging a future in which attackers can fully exploit IoT vulnerability.
Scooped by Judy Curtis / SIPR
January 4, 2018 8:56 PM
Scoop.it!

IoT Security in an Age of Insecurity | IoT For All

IoT Security in an Age of Insecurity | IoT For All | Smart Cities & The Internet of Things (IoT) | Scoop.it
Takeaways from a talk on IoT security at a New America event in D.C. include two-factor authentication, encryption methods, and more.
Judy Curtis / SIPR's insight:
Discussions about the Internet of Things (IoT) often focus on a “Security vs. Privacy” paradigm. However, last month author Susan Landau emphasized instead that discussions should focus on “Security vs. Security” at a New America event titled Listening In: Cybersecurity in an Insecure Age.

In her same-titled book, Landau’s historical perspective, legislative knowledge, and cyberattack descriptions make a convincing case for the need to secure our data.

She describes how security has matured slowly leading up to today’s strong-encryption found in corporate, government, and military environments.
1
Judy Curtis / SIPR's curator insight, February 14, 2018 5:47 PM
Discussions about the Internet of Things (IoT) often focus on a “Security vs. Privacy” paradigm. However, last month author Susan Landau emphasized instead that discussions should focus on “Security vs. Security” at a New America event titled Listening In: Cybersecurity in an Insecure Age. In her same-titled book, Landau’s historical perspective, legislative knowledge, and cyberattack descriptions make a convincing case for the need to secure our data. She describes how security has matured slowly leading up to today’s strong-encryption found in corporate, government, and military environments.