Electronics

BlueTooth on Your Defibrillator? The Case Against Wi-Fi

As more and more devices become networked, the use cases for wireless communications protocols like Bluetooth and NFC (Near Field Communications) multiply. Hardly a week goes by where some company figures out a way to pair wireless communications with some inanimate object or another. (Bluetooth bike locks, anyone?) But what happens when those wireless devices run critical infrastructure or life-saving technology like implanted medical devices? We learned earlier this week that no less than Dick Cheney was concerned enough about wireless attacks on his implanted defibrillator that he had the wireless management features of the device disabled, for fear they could be used in an assassination attempt. Security experts, like Dr. Kevin Fu at The University of Michigan,  doubtful that such an attack was realistic, also refused to rule it out entirely. Given the many, proven tools and strategies for hacking wireless communications like Bluetooth, you might think that foregoing well […]

Is A Nest Botnet In Our Future? A Conversation With IoT Researcher Daniel Buentello

Daniel Buentello is one of the top security researchers out there looking into the security of common, consumer products that are part of the growing “Internet of Things.” Most recently, Buentello has been making the rounds of security cons with a presentation he calls “Weaponizing Your Coffee Pot.” The talk, which Bountello presented at the recent DerbyCon hacker conference in Kentucky and at ToorCon in Seattle in July. That talk was something of a call to arms for security folk to start poking around the growing list of IP-enabled consumer products. Buentello notes that most – including products from large firms like Belkin are insecure by design and in deployment. As we noted when we wrote about Buentello presentation early in October, the interesting stuff here is Daniel’s methodology for reverse engineering the software that runs these commercial developments, which offers something of a blueprint for others to follow.  More recently, Buentello turned his gaze to […]

Exclusive: Apple Store Favorite IZON Cameras Riddled With Security Holes

It’s another day, another face-palm moment for the home surveillance camera industry. Just one month after the Federal Trade Commission (FTC) settled a complaint with the maker of SecurView, a line of poorly secured home surveillance cameras, a researcher at the firm Duo Security has found a slew of even more serious security holes in the IZON Camera – a popular product that is sold in Apple Stores and Best Buy, among others. A review by The Security Ledger found dozens of such systems accessible via the public Internet, in some cases allowing anyone to peer into the interiors of private residences and businesses. Mark Stanislav, the Security Evangelist at the firm Duo Security, presented the details of a security audit of the IZON camera at a security conference in New York on Tuesday. Stanislav documented troubling security lapses including a wide-open configuration with exposed ports for accessing the device […]

Microsoft Tests Glass Competitor. But Do Wearables Threaten Privacy, Social Norms?

Forbes has a really interesting article a couple of days back that posited the huge dislocations caused by wearable technology – including front-on challenges to social norms that are thousands of years in the making and contemporary notions of privacy. The applications for wearable technology like Google Glass are too numerous to mention. Just a few include “heads up” displays for surgeons in the operating room. Teachers (or their students) could benefit from having notes displayed in their field of vision, rather than having to resort to printed notes or the (dreaded) Powerpoint slide. But the devil is in the details of the wearable technology, Forbes argues. Unlike external devices – pagers, mobile phones, smart phones – wearable tech is more intimately connected to ourselves: in constant contact with our bodies and notifying us with vibrations and sounds in ways that it may be difficult to ignore, Forbes argues. Indelicately implemented, […]

Printable Smart Labels Warn When The Milk’s Gone Bad

What’s been called “The Internet of Things” or “The Internet of Everything” is a revolution in computing that has seen the population of Internet connected “stuff” skyrocket. By 2020, there will be an estimated 50 billion devices connected to the Internet (or whatever its called then). Today, the list of IP-enabled stuff is already long: phones, automobiles, household appliances, clothing. But, under the hood, a lot of these devices really aren’t much different from the PCs that grace our desks. They have hard drives, CPUs, memory, input devices, and so on. Most are still assembled in factories by humans and machines. This can be done cheaply and, in some cases, automated. But it’s still a labor-intensive and expensive process. But what if you could just “print” working electronics like, say, The New York Times prints its daily newspaper (at least for now!)?   That would change everything. For one thing: […]