A heads up to Jaikumar Vijayan over at Computerworld.com for picking up on this really interesting study (PDF) conducted at the University of Denver that shows how driver monitoring technology that is becoming very popular in the insurance industry may constitute a big breach of privacy. If you haven’t heard of them before, use-based insurance (or so-called “Pay as You Drive” or PAYD) programs are all the rage in the auto insurance industry. They make a lot of sense: rather than penalize good drivers for the crummy driving of others, leverage on board technology within the insured vehicle to monitor the miles traveled, speed, braking and other vital statistics. The technology allows infrequent, safe drivers to pay much lower premiums, while drivers who rack up tens of thousands of miles a month, or career around the roads at breakneck speeds to pay premiums that are appropriate given the amount of driving and […]
Technologies
Set Top Boxes To Surveillance: Cisco Aims To Be IoT’s 600lb Gorilla
Cisco Systems is one of the biggest ecosystem players with its eyes trained on the Internet of Things. This makes sense. After all, the company made its fortune selling the gear – routers and switches – that make the Internet hum, and that helped extend Internet connectivity to homes and businesses. Along the way, Cisco has been aggressive about acquiring new and promising technologies that promise to grow its top line. took some bad turns – unsuccessfully branching into consumer electronics in 2009 with the acquisition of Pure Digital, maker of the Flip camcorder, and Linksys, a maker of home networking gear, in 2003. The company discontinued the Flip product and sold Linksys to Belkin earlier this year amid a major corporate shake-up designed to re-focus the company. Now, with the next wave (Cisco calls it the 4th) of Internet connectivity upon us – namely: the “Internet of Things” (or […]
FDA Will Regulate Some Apps As Medical Devices
In an important move, the U.S. Food And Drug Administration (FDA) has released final guidance to mobile application developers that are creating medical applications to run on devices like the iPhone and Android mobile devices. Some applications, it said, will be treated with the same scrutiny as traditional medical devices.* The statement is the final word from the FDA on the approach it will take when enforcing federal regulations regarding the safety of medical devices to the large and fast-growing category of medical applications. The agency said on Monday that, while it doesn’t see the need to vet “the majority of mobile apps,” because they pose “minimal risk to consumers,” it will exercise oversight of mobile medical applications that are accessories to regulated medical devices, or that transform a mobile device into a regulated medical device. In those cases, the FDA said that mobile applications will be assessed “using the same […]
iPhone TouchID Falls To Well-Known Hack
Apple’s Touch ID may be the new thing when it comes to signing on to your iPhone. But the underlying finger print scanning technology proved vulnerable to a very old-school attack, according to information posted by the German hacking crew The Chaos Computer Club (CCC). The group announced late Saturday that it was able to successfully bypass TouchID with a fake fingerprint, lifted from a glass surface. “This demonstrates – again – that fingerprint biometrics is unsuitable as access control method (sp) and should be avoided,” the group wrote in blog post announcing the compromise. Apple’s Touch ID biometric sign-on was the major new feature in the just-released iPhone 5S (the feature is not offered for the lower-cost 5C, which was also just announced.) The feature makes use of technology Apple acquired in July 2012 with the firm AuthenTec, and its addition to the iPhone line was no surprise. But […]
Podcast: Securing The Internet of Things
One of the most vexing problems created by the fast-evolving Internet of Things is how to secure the massive trove of data that is transmitted and then stored by smart devices such as automobiles, consumer and household electronics and personal devices. As we’ve seen, private sector firms have been aggressive in leveraging new technology to connect their products to the Internet. But less thought has been given to the security and privacy implications of doing so. Now people are starting to take notice. In recent weeks, the FTC settled a case with a California firm, TRENDNet over balky home surveillance cameras they sold – cameras that were discovered to be easily discoverable and hackable from the public Internet. But, with so many cooks in the IoT kitchen (so to speak), where does responsibility for securing technology lie? Recently, I chatted with an expert on security and the Internet of Things. […]