02. July 2016 · Comments Off on The Second Law of IoT: Not All “Things” that Can Be Connected Should Be Connected · Categories: News · Tags: ,

In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is established, we should know not only that a connection has been created, but also why, what risks will result, and how those risks will be managed. If connections must be made with care—or in some cases not at all—then why should we assume “things that can be connected will be connected?” It might initially appear that my proposed first and second laws of IoT contradict one another.  I would argue against this conclusion.

Source: The Second Law of IoT: Not All “Things” that Can Be Connected Should Be Connected

24. June 2016 · Comments Off on Verizon’s ICSA Labs unveils IoT security testing program · Categories: News · Tags: , , , ,

To help companies mitigate risks associated with an increasingly connected world, ICSA Labs, an independent division of Verizon, is rolling out a new security testing program to provide assurance testing for Internet of Things (IoT) devices and sensors. The program is believed to be among the first-of-its-kind.ICSA Labs will test six components as part of the new IoT Security Testing and Certification Program including:  alert/logging, cryptography, authentication, communications, physical security, and platform security.  The ICSA Labs Product Assurance Report found the majority of security devices fail to perform as intended.

Source: Verizon’s ICSA Labs unveils IoT security testing program

16. March 2016 · Comments Off on Devices spawn an Internet of Evil Things say global InfoSec execs · Categories: News · Tags: , , , ,

Oh great. The world’s internet security professionals are increasingly worried about what they are calling the Internet of Evil Things.These concerns stem from the risks posed by connected Internet of Things (IoT) devices — a problem which is set to grow, even as resources and visibility into such connected devices have stagnated, according to a new survey.

Source: Devices spawn an Internet of Evil Things say global InfoSec execs – WHICH 50

13. January 2016 · Comments Off on Aussie firm uses the Internet of Things to keep workers safe in desert heat · Categories: News · Tags: , , , ,

Construction is a business that carries inherent risks, especially when your teams are working in one of the most remote regions of the world. Operating in the Australian outback, where heatstroke can injure or even kill workers in hours with little warning, engineering firm Laing O’Rourke uses the power of the Internet of Things (IoT) to keep its workers safe.

Source: Aussie firm uses the Internet of Things to keep workers safe in desert heat | Internet of Things

26. October 2015 · Comments Off on Easily Hacked Smart Kettle Highlights IoT’s Security Issues · Categories: News · Tags: , , , ,

Connected devices like smart thermostats, smart washing machines, smart locks, smart fridges, and etc. are all great ideas. The idea of being able to remotely turn them on, set them on a schedule, adjust themselves based on your needs, and so on are huge conveniences, but they also seem to be potential security risks.Recently it has been discovered by the folks at Pen Test Partners (via Techdirt) that a smart kettle made by a company called Smarter is susceptible to hacks.

Source: Easily Hacked Smart Kettle Highlights IoT’s Security Issues