Networking equipment giant Cisco Systems said that it is combining elements of the open source Linux operating system to its IOS firmware, launching a new architecture it calls “IOx” that will connect the billions of intelligent devices that will make up the Internet of Things. The new architecture was announced at Distributech in San Antonio – a trade show for the utility industry, on Wednesday. The company said IOx will make it easier for its customers to connect Internet of Things devices to back-end resources and the larger Internet. As it stands, the Internet of Things ecosystem is fragmented. Intelligent devices like the Nest Thermostat typically communicate back to proprietary cloud resources and might communicate with their surroundings using any one of a number of wireless protocols, including Bluetooth, Bluetooth Low Energy, Zigbee, Z-Wave, and so on. That balkanization has made it hard to create IoT solutions that span different families […]
Telecommunications
US Allows More Talk About Surveillance Orders
The U.S. Department of Justice has acceded to requests from some large, technology firms, allowing them to post more specific information about government requests for data on their users, according to a report by The New York Times. In a statement released on Monday, Attorney General Eric Holder and James R. Clapper, the Director of National Intelligence, the new rules allowing some declassification followed a speech by President Obama calling for intelligence reform. “The administration is acting to allow more detailed disclosures about the number of national security orders and requests issued to communications providers, and the number of customer accounts targeted under those orders and requests including the underlying legal authorities,” the joint statement reads. “Through these new reporting methods, communications providers will be permitted to disclose more information than ever before to their customers.” [Read more Security Ledger coverage of the NSA surveillance story.] Previously, companies were prohibited from […]
Mobile Devices Taking Part In Enterprise DDoS Attacks?
Mobile phones have long been on the radar for enterprises concerned about data loss and the spread of malicious code. But a report from the firm Prolexic suggests that they may also be taking part in massive denial of service (DoS) attacks against enterprise networks. The firm Prolexic said that data it collected in the final quarter of 2013 suggests that mobile devices are playing a growing role in distributed DoS (or DDoS) attacks against the firm’s enterprise customers. “Malicious actors now carry a powerful attack tool in the palm of their hands, which requires minimal skill to use,” said Stuart Scholly, president of Prolexic, in a statement. [Read more Security Ledger coverage of Denial of Services Attacks.] Infecting unwitting victims with a malicious program is a common method used by botnet operators whose platforms are behind many large-scaled DDoS attacks. But Scholly said that mobile devices and mobile DDoS […]
NSA Toolbox Included Hacks For Juniper, Cisco, Dell
The German magazine Der Spiegel made headlines this week with its story detailing the US National Security Agency’s (NSAs) offensive hacking capabilities. The story is based on classified NSA documents absconded with by former contractor Edward Snowden and lays bare a Webster’s Dictionary full of classified hacking tools and programs. Among the highlights of the story: + The NSA developed and deployed a wide range of hacking tools that could compromise hardware from leading IT and networking equipment makers including Cisco Systems, Juniper Networks and the Chinese vendor Huawei and Dell Inc. + The NSA tools were designed to provide persistent access that allowed the NSA to monitor activity on the compromised endpoint, avoid detection by third party security software and survive software and firmware updates. One such tool, DEITYBOUNCE, provided persistent access to Dell’s PowerEdge servers by “exploiting the system BIOS” and using “System Management Mode to […]
AT&T: Security A Top Issue For M2M In 2014
There’s an interesting 2014 predictions blog post by AT&T’s Mobeen Khan that offers some thoughts on where the market for Machine-to-Machine (or M2M) technology is going in the next 12 months. According to Khan, an Executive Director of Marketing at AT&T Business, the M2M space is poised to take off in the next twelve months, as consumer demand for “smart” devices grows in both developed and developing markets, and as the M2M application stack matures, attracting the interest of developers. With M2M technology maturing, and the “Internet of Things” exiting its “gee whiz” phase, firms selling the technology no longer need to worry as much about justifying the return on investment for M2M and IoT technology. As that happens, however, security will become the most pressing issue in the M2M space, Khan believes. “To date, companies deploying M2M solutions have looked to ROI as the #1 need. As the need/ROI of […]