In-brief: the Chinese firm whose software powers many of the devices taking part in the Mirai Internet of Things botnet acknowledged some responsibility for the incident.
Reports
Opinion: Anomaly Detection is no Silver Bullet for Incident Response
In-brief: detecting anomalous behavior is a necessary part of incident response – but it’s also harder than it sounds, argues Alan Hall of BlueCoat Systems in this commentary.
The New York Times: Internet of Things Security a Challenge to Civilization
In-brief: Steve Lohr at The New York Times had an interesting piece on security for the Internet of Things this week, noting that Internet of Things security poses a challenge to civilization. Steve Lohr at The New York Times had an interesting piece on security for the Internet of Things this week, which I’ve linked to. From the article: The optimistic outlook is that the internet of things will be an enabling technology that will help make the people and physical systems of the world — health care, food production, transportation, energy consumption — smarter and more efficient. The pessimistic outlook? Hackers will have something else to hack. And consumers accustomed to adding security tools to their computers and phones should expect to adopt similar precautions with internet-connected home appliances. “If we want to put networked technologies into more and more things, we also have to find a way to make […]
Scaling Security for The Internet of Things with MUD
In-brief: Cisco’s Marc Blackmer discusses a proposal before the IETF that would create a Manufacturers Usage Description (MUD) standard by which device makers and their customers to specify the kinds of activities and communications are allowed for Internet of Things devices.
12 Years Later: Common Configuration Flaw + Internet of Things = Massive Attacks
In-brief: A common configuration flaw may be behind a massive network of IoT devices used in “credential stuffing” attacks, according to the security firm Akamai.