Consumers who outfit their homes with home automation devices without considering security may be inviting hackers and thieves inside.Repeatedly, studies have revealed that devices designed to automate the home have serious vulnerabilities. Many devices have weak password policies and do not protect against man-in-the-middle attacks, according to an HP survey of 10 off-the-shelf home security systems. Others do not prevent access to the device’s debugging interface, which could allow easy hacking of the device, according to an April study by code-security firm Veracode.
It seems that everywhere we look, more home devices and appliances are receiving smart functionality. Today, consumers can buy refrigerators that will email them when certain items run low, smoke alarms that will text them when they detect smoke and cameras that will stream videos of pets, or even intruders, as they move from room to room.The conveniences of a smart home are undeniable. But each amenity we add to our home comes at a cost – and too often that cost is paid in terms of security. Each smart device we add to a home is equivalent to adding another door or window. Without the proper embedded security within the device, the lock is nonexistent.
Give yourself peace of mind, and your home the security it deserves, no matter whether you’re at work or away for the weekend.Forget worrying about whether you left the door unlocked, or if your home is vulnerable to burglars, thanks to the advanced security and home automation systems from Vivint.No matter where you are, Vivint can simplify your life with their remote access home security systems that allow you to check your home is safe and sound via your smartphone – so you can rest easy on your break.
At least twice a week someone pings me with an idea for a guest article on how engineers must solve security problems if the Internet of Things is going to reach its potential. After plenty of talk on the topic, a wave of real action is on the rise.The Intel-led Open Interconnect Consortium defining a high-level IoT software stack recently called for engineers to join its work on security. I know its rival, the Thread Group, is engaged in similar work. The IEEE is taking a different tack, organizing an effort in which policy makers to join engineers
Dropcam’s debut in 2009 and its rounds of funds and successful acquisition by Nest established a legendary story for the following contenders such as Canary, Piper, and many more DIY home security cameras. Everyone wanted to follow in Dropcam’s footsteps. In the course of the last five years since Dropcam’s first appearance, home security cameras have been improving. They have become more affordable, easier to setup, and better integrated with their mobile apps, etc. So what’s next for home security cameras? Are they dying down? Is the demand still there?
There’s a lot of hype around securing the Internet of Things (IoT). At the end of the day, I suggest that a more reasoned approach is in order. Securing the IoT will not be achieved by frantic worry about the volume of endpoints. Myopic focus on the volume of devices in an IoT ecosystem can lead to an important misstep: forgetting that it’s the Internet of Things. That means that all this data is passing through the network. Therefore, tackling security can only occur with diligent attention to the core of the IoT, namely, the network stack. In that way security can become as pervasive as the IoT itself.
Hackers will put Internet-connected embedded devices to the test at the DefCon 23 security conference in August. Judging by the results of previous Internet-of-Things security reviews, prepare for flaws galore.This year, DefCon, the largest hacker convention in the U.S., will host a so-called IoT Village, a special place to discuss, build and break IoT devices.”Show us how secure (or insecure) IP-enabled embedded systems are,” a description of the new village reads.
Identiv, Inc. (Nasdaq:INVE), today has made available an Internet of Things (IoT) thought leadership paper entitled “Identity Is the New Perimeter: Embracing the Identity of Things” featuring Gartner research “The Identity of Things for the Internet of Things” by Earl Perkins and Ant Allan. Written for security leaders in digital business, the paper explores the importance of identity and authentication in the connected world that makes up the Internet of Things (IoT).
After losing its dominant position in the mobile world, BlackBerry (NASDAQ: BBRY ) has been moving on to new opportunities. One of its latest plays is in securing the next big thing in technology — the Internet of Things. BlackBerry said last week that its subsidiary company, Certicom, will issue security certificates to device makers and service providers that want to connect their devices and networks to the Internet of Things, or IoT.