IoT is Coming Even if the Security Isn’t Ready: Here’s What to Do

Posted by & filed under Cybersecurity, Internet of Things.

In a May study of 553 IT decision makers, 78% said they thought it was at least somewhat likely that their businesses would suffer data loss or theft enabled by IoT devices. Some 72% said the speed at which IoT is advancing makes it harder to keep up with evolving security requirements. Source: Wired Magazine Date: February 23rd, 2018… Read more »

If Canadian spies found a flaw in the iPhone, would they tell Apple?

Posted by & filed under Apple, Cybersecurity.

It’s unclear what Canada’s electronic spy agency, the Communications Security Establishment, does when it finds a security flaw in a widely used operating system or a much-loved messaging app. Source: CBC News Date: February 8th, 2018 Link: http://www.cbc.ca/news/technology/cse-c59-software-vulnerabilities-disclosure-matthew-dube-1.4508703 Discussion 1) Does the Canadian CSE have a duty to protect Canadian’s from a security flaw or protect Canadian security?… Read more »

ATM “jackpotting” comes to the U.S. as alleged thieves trick machines into giving up $328,200

Posted by & filed under Cybersecurity.

Two Venezuelan men went on a crime spree through Colorado, Idaho and Utah, cracking into seven ATMs and using software to trick the machines into spitting out as much as $98,000 at a time.  The alleged crooks used a technique common in Latin America and Europe but very new in the U.S. called “jackpotting.” Thieves use a key… Read more »

Data-stealing spyware ‘traced to Lebanon’

Posted by & filed under Cybersecurity.

A security bug that has infected thousands of smartphones has been uncovered by campaign group the Electronic Frontier Foundation (EFF).  Working with mobile security firm Lookout, researchers discovered that malware in fake messaging designed to look like WhatsApp and Signal had stolen gigabytes of data.  Targets included military personnel, activists, journalists and lawyers.  Researchers say they traced the… Read more »

Update your software today. Seriously.

Posted by & filed under Cybersecurity.

Chances are you own a smartphone or computer that contains a chip hackers could potentially exploit to get access to sensitive information.  That’s because billions of devices are affected by two major security flaws revealed by cybersecurity researchers recently. The flaws — dubbed Meltdown and Spectre — affect processing chips made by Intel (INTC), AMD(AMD) and ARM Holdings. That means if you… Read more »

The labs that protect against cyber warfare

Posted by & filed under Cybersecurity.

The world has entered a new era of conflict – offensive cyber-attacks aimed at infrastructure and society, all done without a shot being fired. The first nation state-level cyber-attack on critical infrastructure, widely attributed to a joint collaboration between American and Israeli intelligence against Iran, was uncovered in 2010. Known as the Stuxnet virus, the attack aimed… Read more »

HP laptops found to have hidden keylogger

Posted by & filed under Consumer Technology, Cybersecurity, Ethical Issues.

Hidden software that can record every letter typed on a computer keyboard has been discovered pre-installed on hundreds of HP laptop models. Security researcher Michael Myng found the keylogging code in software drivers preinstalled on HP laptops to make the keyboard work. HP said more than 460 models of laptop were affected by the “potential security vulnerability”. Source: BBC Technology… Read more »

Smart-home tech developers may be prioritizing convenience over security

Posted by & filed under Cybersecurity, Internet of Things.

The proliferation of internet-connected home devices such as thermostats, baby monitors and fridges is creating an ever-expanding interconnected web known as the Internet of Things, or IoT. But security and legal experts warn that machine-to-machine communication is creating a new level of risk — by providing hackers with new vulnerabilities to exploit. Source: Toronto Star Date: December… Read more »

A Tiny New Chip Could Secure the Next Generation of IoT

Posted by & filed under Cybersecurity, Emerging Technologies, Internet of Things.

The challenge with internet of things security so far has been the cost of implementing hardened features. It’s cheaper and faster to develop a product without spending time and resources on security. Devices rush off the line without adequate protections, often riddled with bugs, and rarely have a mechanism for manufacturers to distribute patches. An attacker who… Read more »

Face ID iPhone X ‘hack’ demoed live with mask

Posted by & filed under Apple, Cybersecurity.

A Vietnamese cyber-security firm has shown the BBC how a mask can be used to unlock Apple’s new iPhone X. The demo took place about a week after Bkav first claimed to have undermined the handset’s security. But other experts have cast doubt on what the “hack” amounts to. Apple has not commented beyond referring… Read more »