Bluetooth Low Energy

Bluetooth Flaw affects Billions of Devices and has a Name: BlueBorne

In-brief: Dubbed BlueBorne, the flaw could affect billions of devices that use the Bluetooth wireless protocol, enabling remote hacks, the security firm Armis warned. 

Security Pro tilts at Smart Drill, finds It doesn’t suck

In-brief: Is there cause for hope? A new analysis of a connected power drill  by a researcher at DUO Security finds that it’s actually pretty secure. But challenges remain for connected device makers.

Verizon, Qualcomm Back LTE for Secure Internet of Things

File this one under “Darwinian battle for wireless survival.” Verizon and Qualcomm used the CTIA Super Mobility show in Las Vegas today to unveil plans to use Verizon’s ThingSpace IoT platform as a service with Qualcomm’s LTE modems, with greater security for IoT deployments as a major selling point. According to an announcement by the companies, Verizon will pre-integrate its ThingSpace within Qualcomm’s MDM9206 Category M (Cat M1) LTE modem. Verizon’s 4G LTE network will become the intended backbone for “building, deploying and managing IoT applications customized for a wide-range of use cases,” according to the statement. 4G networks have widely been perceived as too expensive and overpowered for many IoT deployments, such as low power sensors and single-function or intermittently connected endpoints. The new arrangement is intended to grab some of that low power business back from competing short-range technologies like Wi-Fi, Bluetooth, Zwave and Zigbee, or from low power […]

Everything Tastes Better with Bluetooth: Understanding IoT Risk

In-brief: Marc Blackmer of Cisco says that, with so much promise, it can be hard to anticipate how individual or company-wide decisions to embrace the IoT might bear on cyber risk. 

A Good Housekeeping Seal for the Connected Home?

In-brief: Experts on the security of the Internet of Things warned that lax security and privacy protections are rampant in connected home products, but consumers have no way of knowing whether the products they buy are easy targets for hackers.