mobile devices

Beware: Targeted Attacks on iPhone Users are a Thing | Lookout Blog

Beware: Targeted Attacks on iPhone Users are a Thing | Lookout Blog

In-brief: Lookout said it identified an active threat that was using three critical iOS zero-day (that is: previously unknown) vulnerabilities. When exploited, the three vulnerabilities “form an attack chain that subverts even Apple’s strong security environment.”

Wearables like Apple's new watch will combine with health middleware to expand the market for connected health products, says one prominent healthcare CIO.

Privacy Forum Pushes Guidance for Wearables, Health Apps

In-brief: new guidance from the Future of Privacy Forum urges connected health device makers to address security and privacy issues to prevent sensitive data from falling into the wrong hands. 

Fiat Chrysler Launches Public Bug Bounty – But It’s Not All That

Fiat Chrysler Launches Public Bug Bounty – But It’s Not All That

In-brief: Fiat Chrysler Automobiles (FCA) has unveiled a public “bounty” program that will pay security researchers up to $1,500 dollars for information on vulnerabilities in software used in conjunction with the company’s vehicles. Don’t get too excited. 

Nokia says scale and security will help its Impact IoT platform best a crowded field. (Image courtesy of Nokia.)

Nokia: Security, Scale Give IMPACT IoT Platform An Edge

In-brief: After a fall from grace in the mobile handset business, Nokia is betting that its ability to do scale and security will help its Impact IoT platform best a crowded field. We speak with Rajesh Kashawa, head of Nokia’s Internet of Things Business Unit. 

LED street signs equipped with sensors are just one smart city project piloted in Boston. But concerns about security and privacy can be hard to resolve.

Update: Smart Cities Seek Security, Privacy Expertise

In-brief: Cities and state governments often lack the expertise in cyber security that could help them properly assess the risks of smart city projects, including so-called “cyber physical” risks. (Editor’s note: updated with comments from Chris Rezendes of INEX.)