Kudelski Group launches IoT security centre of excellence

(c)iStock.com/maxkabakov

The Kudelski Group, a digital security provider, has launched its Internet of Things Security Centre of Excellence to help and guide companies to secure their IoT innovations during a product’s lifecycle.

The centre will provide services that not only include hardware and software evaluations and assessments, but also recommendation and implementation of effective design and control frameworks, countermeasures to reduce risks, protect investments and legal advice.

The Kudelski...

By IoT News, 05 January 2017, 0 comments. Categories: IoT, Security.

Why the automotive industry must take the wheel on software security

(c)iStock/Prykhodov

Security is the new must-have car accessory. This doesn’t refer to door locks or car alarms, but rather software security. When you hear about software security you tend to think of computer software, not software in cars.

However, software is not new to vehicles. As the connected cars become more of a reality, manufacturers can’t afford to be complacent when it comes to software and app security, as evidenced by the hacking of the

By Jim Ivers, 04 January 2017, 0 comments. Categories: Connected Vehicles, IoT, Security.

Rakos wants to be the next devastating IoT botnet

(Image Credit: iStockPhoto/weerapatkiatdumrong)

You've likely heard of or even been affected by Mirai, the botnet of IoT devices responsible for a record-breaking DDoS attack which disrupted large services including Twitter, Spotify, and PlayStation Network back in October. A new malware named Rakos could be about to steal Mirai's crown, or at least pose another large...

By Ryan Daws, 21 December 2016, 0 comments. Categories: IoT, Security.

Why there's no time like the present to talk about IoT security

(c)iStock.com/imilian

Opinion Hollywood has no shortage of over-the-top movies focused on hacking. Movies such as Live Free or Die Hard, in which criminal elements gain complete control of the United States via sophisticated hacking. However, as the Internet of Things increasingly connects our physical world to the digital world, these types of attacks can no longer be relegated to the realms of sensationalist fiction.

Serious damage can be done through even the most mundane devices, as seen in the recent...

By Ilan Reingold, 09 December 2016, 1 comment. Categories: IoT, Security.

IoT Security Foundation announces compliance framework

(c)iStock.com/PonyWang

The Internet of Things Security Foundation (IoTSF) has announced the publication of its IoT security compliance framework.

The framework, published at its recent annual conference in London, is in line with IoTSF’s mission to improve the quality and prevalence of security in Internet of Things (IoT). Moreover, the IoTSF promotes the Supply Chain of Trust concept which inspires producers to adopt a duty of care for their own customers and towards the wider eco-system.

The framework...

By IoT News, 06 December 2016, 0 comments. Categories: IoT, Security.

Akamai: IoT botnet set a record in a year when DDoS attacks increased 71 percent

(Image Credit: iStockPhoto/ferrantraite)

Content distribution network Akamai has released its latest "State of the Internet" report which covers Q3 of this year and highlights the rise in DDoS attacks, including a record-setting IoT botnet. 

Mirai, a botnet which harnesses unsecured IoT devices, brought down security website Krebs on Security with 623 Gbps of data...

By Ryan Daws, 18 November 2016, 1 comment. Categories: IoT, Security.

Altair Semiconductor partners with Check Point for IoT security

(c)iStock.com/Huchen Lu

Altair Semiconductor has partnered with Check Point Software Technologies to co-develop a comprehensive security solution for IoT devices.

The partnership will allow routing traffic of Altair-enabled IoT devices through Check Point’s Capsule Cloud solution that will screen all the data, preventing any threats before they reach the devices. The enhanced security achieved through routing Altair’s 1160 CAT-1 chipsets through Check Point’s Capsule Cloud includes advanced...

By IoT News, 17 November 2016, 0 comments. Categories: Enterprise, IoT, Security.

Exec argues ‘strategic’ approach required for preventing IoT DDoS attacks

(c)iStock.com/stock_colors

Dennis Monner, the CEO of Germany-based cloud IT security provider Secucloud, argues that a ‘strategic’ approach needs to be taken for companies to avoid DDoS attacks in an Internet of Things (IoT) age.

Monner, making a statement following the Dyn DDoS attack in September, which counts as the biggest DDoS attack of all time, and a further attack in October which brought down sites including Twitter, Spotify and Netflix, argues that crimes are becoming more frequent and...

By IoT News, 15 November 2016, 0 comments. Categories: IoT, Security.

IoT security and how to reduce the risk of another Dyn DDoS attack

(c)iStock.com/PonyWang

In the media, the blame for the recent DDoS attack on Dyn has been firmly placed on IoT devices and as a supplier of connectivity to IoT and M2M devices, we are keen to share advice on how devices should be secured.

The following methods and tactics have been developed from our experience and if used, should prevent the IoT devices from becoming infected with the Mirai malware.

Beyond the altruism of protecting others (and yourself) from potential DDoS attacks, securing your device and...

By Paul Marshall, 03 November 2016, 0 comments. Categories: IoT, Security.

Security firm Rapid7 expands strategic consulting and security testing offerings to secure IoT

(c)iStock.com/RyanKing999

US-based Internet security company Rapid7 has expanded its strategic consulting and security testing offerings to help organisations securely develop and deploy IoT devices.

As part of the IoT practice, Rapid7 will offer strategic guidance, threat modelling, device design consulting and incident response across consumer, enterprise, industrial, medical, and transportation devices

For strategic guidance, Rapid7 will offer a specialist consultancy that will help develop IoT...

By IoT News, 03 November 2016, 0 comments. Categories: IoT, Security.

Eurosmart calls for European cybersecurity enforcement framework

(c)iStock.com/caracterdesign

Brussels-based international digital security association Eurosmart is asking for a European cybersecurity enforcement framework, along with the promotion of a European Internet of Things (IoT) trust label and security certification. The organisation advocates a cybersecurity trust label or security certificate for every IoT provider that not only covers data, but also the network used by IoT providers.

Eurosmart has also established a new body called the ‘IoT Security...

By IoT News, 02 November 2016, 0 comments. Categories: Enterprise, IoT, Security.

Editorial: The 99 percent are being empowered by the IoT without even realising

(Image Credit: iStockPhoto/JohnDWilliams)

One slogan often used by 'Occupy' activists is "We are the 99%" in reference to an increasing disproportion of income and wealth since the 1970s among the top 1% of income earners. The recent Dyn hack shows how IoT devices are providing a means for hacktivists to cause disruption and push for change on a scale that was more difficult to achieve in...

By Ryan Daws, 24 October 2016, 0 comments. Categories: IoT, Security.

Why the IoT is neither ‘new’ nor ‘revolutionary’ – and why data security is the highest priority

(c)iStock.com/serkorkin

Jim Hunter, chief scientist at Greenwave Systems, has told delegates at the recent Broadband World Forum that protection of consumer and security of data should be taken seriously and should be at the heart of developing propositions for the Internet of Things (IoT).

The presentation, titled “The Internet of Things about you: Evolving from data to content and what you can do”, advised the audience that the IoT is all about personal data, as the real opportunity is in...

By IoT News, 21 October 2016, 0 comments. Categories: Data & Analytics, IoT, Security.

Gemalto and Alibaba team up for China IoT security

(c)iStock.com/Sky_Blue

Digital security provider Gemalto has announced it is partnering with Chinese eCommerce giant Alibaba to help secure the country’s IoT ecosystem.

The company is providing connectivity and security for YunOS, a cloud-based IoT operating system developed by Alibaba. Gemalto will provide its Allynis Trusted Service Hub, an interconnected platform traditionally aimed at banks, car manufacturers, transport operators and other service providers, as its part of the...

By James Bourne, 17 October 2016, 0 comments. Categories: IoT, Security.

Cloud Security Alliance outlines 13 steps to developing secure IoT products

(c)iStock.com/AnthiaCumming

The Cloud Security Alliance (CSA) has outlined a series of best practice guidelines to help IoT designers and developers understand various security measures.

Comprising a baker’s dozen of tips, the document ranges from protecting data, to implementing secure authentication, to secure key management. Naturally, these can be seen as fairly standard security tips, but the report notes that the guidance is not meant “as a substitute for understanding fundamental system...

By James Bourne, 13 October 2016, 0 comments. Categories: Development, IoT, Security.

IoT, big data, fog computing, and how the work of today can shape tomorrow

(c)iStock.com/Matej Moderc

The future technological landscape will, according to the experts, be one where driverless vehicles zoom around and cater to passengers’ whims, just one of billions of connected devices. But how can a vision for 2030 be relevant to today’s needs?

Doug Zuckerman is conference chair of the IEEE Technology Time Machine, taking place later this month in San Diego. The conference covers as its key areas big data, brain – how technology can...

By James Bourne, 07 October 2016, 0 comments. Categories: Enterprise, IoT, Security, Standards.

IoT malware attacks becoming more sophisticated – with China and US at the source

(c)iStock.com/sigurcamp

Malware and DDoS attacks targeting the Internet of Things (IoT) have “come of age”, according to research released by security provider Symantec – with the US and China at the forefront of it.

The report examines how cybercriminals are taking advantage of unsecured IoT devices to spread malware and create zombie networks or botnets. China (34%) and the United States (28%) were the most frequent attack origins on Symantec’s specific IoT honeypot by count of...

By IoT News, 28 September 2016, 0 comments. Categories: IoT, Security.

The legal issues with IoT – and the security risks of boundless data

(c)iStock.com/Crews

Data security is a key concern with the Internet of Things, taking into account just how much data can be collected. With various IoT devices talking to each other, the potential for a data security breach is high and with more and more IoT devices coming onto the market, this issue is not going to go away. 

For example, take the smart meter initiative led by the UK government. The intention is that by 2020, over 53 million smart meters shall be installed in over 30 million homes and...

By Sarah Hall, 01 September 2016, 0 comments. Categories: Data & Analytics, IoT, Security.

Securing data for the IoT: A best practice guide

(c)iStock.com/MilesSherrill

With billions of new connections expected in the next decade, it has never been more important to design solutions for trust. Fears about security are a major barrier to the adoption of IoT solutions. The potential to disrupt or even close-down operations, to steal personal or financial data, and peek at industrial secrets and intellectual property pose an ever-present danger. Fortunately, it is becoming easier than ever to build robust security into IoT applications, right from...

By Andrew Pockson, 17 August 2016, 0 comments. Categories: IoT, Security.