The blog TechBitzz has an interesting write-up from Wednesday on electronics giant Lenovo’s partnership with a 35 person New York City based start-up, Vuzix to create an enterprise-ready equivalent to Google Glass. Vuzix was known as a maker of mounted video eyewear and launched its own smart glasses in December 2013. Earlier in 2014, the two companies struck a deal to have Lenovo sell Vuzix’s M100 as a co-brand. The glasses will run Google’s Android operating system – nothing new there. But what is different is Lenovo and Vuzix’ plans for marketing the device. Rather than target the (small) fan boy and early adopter consumer market, the two companies are focusing on business customers as a natural home for connected wearables like ‘smart’ glasses. Read more Security Ledger coverage of wearables here. Lenovo, it seems, is taking a decidedly less utopian view of wearables – seeing them as a natural replacement for its bulky laptops, […]
IoT Security: The Next-Generation Matters Now
As a cyber security professional, I spend most of my days speaking with customers and colleagues about all of the nefarious ways “the bad guys” can wreak havoc and how we can best defend ourselves. The topics we discuss often include situational awareness, defense-in-depth, threat intelligence, and new cyber security paradigms we may find ourselves adopting as the Internet of Things (IoT) evolves. I would assert that these are extremely important topics to sort out. But there’s a very important element not being discussed: the question of who will sort them out. Simply put: what difference does it make if you have the world’s greatest technology if nobody in your organization knows what to do with it? Cisco estimates that there will be a deficit of one million skilled cyber security professionals over the next five years. By 2015, 90 percent of jobs in the developed world will require some set of […]
Customer Support A Weak Link In Two Factor | Ars Technica
Ars Technica has an interesting write-up on an apparently successful compromise of Google’s two-factor authentication technology. Though in this case, the culprit wasn’t any system Google deployed or managed, but a gullible customer support representative working for the victim’s cell phone carrier. According to this post over at Facebook-for-hipsters site Ello.co, Grant Blakeman woke up on a recent Saturday morning to find that his Google account had been hijacked – despite the fact that he used Google’s two-factor authentication to protect access to the account. How? Blakeman enlisted the help of none-other than Mat Honan, whose own struggles with account hijacking became the subject of a much-cited Wired feature article. As with Honan, Blakeman’s valuable three-character Instagram account, @gb, appears to have been the lure for hackers. (Honan’s @mat Twitter account was what lured his attackers.) Read “Researchers sidestep Paypal Two-Factor Authentication.” After a conversation with Honan, Blakeman contacted his cell provider and […]
Tech and Telecoms Fight to dominate ‘Internet of Things’ – FT.com
The Financial Times has an interesting piece on the ongoing push and pull to develop cross-industry tech standards to govern the Internet of of Things. The article, by Daniel Thomas makes note of efforts by companies including Arm, Google and Vodafone to secure leading positions in the technology infrastructure that will provide connections to smart devices, even as firms like Apple and Google dominate the market for mobile devices and wearables that are at the vanguard of IoT. “The fragmentation and lack of technology standards could provide the biggest opportunity for telecoms operators in a fast-evolving industry already changing how people live,” says Matthew Howett, an analyst at Ovum tells FT. “There is a clear opportunity for an aggregator who is able to interconnect the myriad inoperable devices.” The article makes mention of the newly released ETSI specifications for Internet of Things (IoT) networks dedicated to low throughput communications. You can […]
Whack-A-Bash: New Vulnerabilities add to Patch Confusion
The good news about the rapid, industry response to the revelations about exploitable security holes in GNU Bash (Bourne Again Shell) (aka “Shellshock”) is that Linux users had a fix in hand almost as soon as they became aware of the problem those patches addressed. The bad news about the quick fixes for the two issues, CVE-2014-6271 and CVE-2014-7169, from the likes of Red Hat, Ubuntu, Debian and others is that – in being early- they fail to fix the problems we don’t yet know about. And that’s what we’re seeing in the wake of last week’s storm of patches: a steady drip-drip of disclosures that suggest that Bash may contain other problems worthy of new fixes. Within hours of the disclosure of the first holes, there were problems discovered by Red Hat Product Security researcher Todd Sabin, who found additional “off by one” errors in Bash that were assigned CVE-2014-7186 and CVE-2014-7187 and […]