Fitness apps are proving to be a lot less beneficial to military security than they are for military fitness. That after researchers in the Netherlands discovered that data from the Polar fitness app revealed the homes and habits of those exercising in clandestine locations around the world, including intelligence agencies, military bases, nuclear weapons storage sites and embassies.
Connected devices aren’t just fodder for botnets. They increasingly act as malicious “insiders” capable of spying on their surroundings and providing valuable intelligence on homes and offices, argues Yotam Gutman of the firm Securithings in this industry perspective.
Recognizing the persistent need for security to protect connected devices, industry leaders are collaborating through two separate efforts on Internet of Things (IoT) standards and guidelines to help combat the emerging IoT threat landscape.
Episode 101: Ink Jet Nation? Doctorow on a Dystopian IoT and City of Atlanta Employees phished on Rogue Wi-Fi
Podcast: Play in new window | Download (Duration: 53:43 — 61.5MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of the podcast (#101): will the Internet of Things enable a glorious future of intelligent and subservient “things”? Or will it birth “ink jet nation:” a dystopia of closed and expensive technology silos that use patents, software licensing and lawsuits constrain the use, reuse and repair of connected things? We talk to author and activist Cory Doctorow following his keynote at last week’s Security of Things Forum. Also: the city of Atlanta has made headlines after a ransomware outbreak crippled city services. But the city may have more to worry about: wireless phishing attacks targeting government employees and elected officials. We speak with Dror Liwer of the firm Coronet about what they found.
A new, extremely evasive botnet has been discovered that takes unique leverage of command and control servers and can completely take over an enterprise device to execute any type of code it wishes, from ransomware to trojans to data extraction, according to researchers at endpoint and mobile security firm Deep Instinct.