Smart-home tech developers may be prioritizing convenience over security

Posted by & filed under Cybersecurity, Internet of Things.

The proliferation of internet-connected home devices such as thermostats, baby monitors and fridges is creating an ever-expanding interconnected web known as the Internet of Things, or IoT. But security and legal experts warn that machine-to-machine communication is creating a new level of risk — by providing hackers with new vulnerabilities to exploit. Source: Toronto Star Date: December… Read more »

A Tiny New Chip Could Secure the Next Generation of IoT

Posted by & filed under Cybersecurity, Emerging Technologies, Internet of Things.

The challenge with internet of things security so far has been the cost of implementing hardened features. It’s cheaper and faster to develop a product without spending time and resources on security. Devices rush off the line without adequate protections, often riddled with bugs, and rarely have a mechanism for manufacturers to distribute patches. An attacker who… Read more »

Face ID iPhone X ‘hack’ demoed live with mask

Posted by & filed under Apple, Cybersecurity.

A Vietnamese cyber-security firm has shown the BBC how a mask can be used to unlock Apple’s new iPhone X. The demo took place about a week after Bkav first claimed to have undermined the handset’s security. But other experts have cast doubt on what the “hack” amounts to. Apple has not commented beyond referring… Read more »

Cybersecurity: Barely perceptible threat has potential to derail Canada’s economy

Posted by & filed under Cybersecurity.

When Victor Dodig checks his phone in the morning, the chief executive of CIBC dreads reading that any government or corporation, anywhere in the world, has been hacked, he told an Ontario Securities Commission panel last month.  “Obviously, it would be more of a concern if our institution was, but we’re so interconnected that one weak… Read more »

Your browser could be mining cryptocurrency for a stranger

Posted by & filed under Crypto currency, Cybersecurity.

THERE’S SOMETHING NEW to add to your fun mental list of invisible internet dangers. Joining classic favorites like adware and spyware comes a new, tricky threat called “cryptojacking,” which secretly uses your laptop or mobile device to mine cryptocurrency when you visit an infected site.  Malicious miners aren’t new in themselves, but cryptojacking has exploded in popularity… Read more »

Could Estonia be the first “digital country”?

Posted by & filed under Competitive advantage, Cybersecurity, IT and Politics, IT and the law.

Estonia says it’s the first country in the world to offer “e-residency” – granting anyone in the world a digital government ID and access to online services. Source: BBC Future News Date: October 20th, 2017 Link: http://www.bbc.com/future/story/20171019-could-estonia-be-the-first-digital-country Discussion 1) “in 2007, an infamous crisis in which Russia waged what’s considered the first cyberwar on Estonia. Banks had their servers… Read more »

How may I help you? Virtual Shopping Assistants

Posted by & filed under Artificial intelligence, Augmented Reality, Cybersecurity, Emerging Technologies.

Source: BBC Technology News Date: October 10th, 2017 Link: http://www.bbc.co.uk/news/resources/idt-sh/disruptors_how_may_I_help_you Discussion 1) “In the brave new world of retail this won’t necessitate a trek out to the nearest late night supermarket. Instead the shop can come to you.  With the touch of an app button, you hail a low-slung electric vehicle, like a glass-sided motorhome, which quietly glides into… Read more »

Spies’ use of cellphone surveillance technology suspended in January, pending review

Posted by & filed under Cybersecurity.

When a crippling ransomware attack wreaked havoc on computers around the world earlier this year, it did so with alarming, worm-like speed. It didn’t take long for security researchers to find out why. The highly sophisticated code that was used to sneak silently into computers, largely undetected, had been stolen from the NSA. The incident thrust a… Read more »

How to beat security threats to ‘internet of things’

Posted by & filed under Cybersecurity, Internet of Things.

The “internet of things” is all about connecting objects to a network and enabling them to collect and share data. Household objects like thermostats, light switches, doorbells, washing machines, fridges and even toys can all be connected via wi-fi and controlled remotely. But how safe are your home appliances from hacking? Source: BBC Technology News Date: May 25th, 2017… Read more »