In-brief: IBM researchers say they discovered a flaw in an SDK from the cloud storage firm Dropbox that could result in Android users accidentally sending their data to a Dropbox account controlled by a malicious actor.
Top Stories
Twitter Accounts to follow for IoT and Security
Twitter is a great place to keep tabs on what leading security researchers, academics, policy makers and luminaries are up to. That’s no different for security and Internet of Things, where scores – even hundreds – of world-class researchers and thought leaders share their latest work, exchange ideas, opine and post pictures of their cats. Here are a few of the most rewarding security and Internet of Things accounts that we follow here at The Security Ledger. [soliloquy id=”56140″]
Is Silicon Valley Underestimating IoT? | Venture Beat
In-brief: Tech visionary Tim O’Reilly says that Silicon Valley’s focused on connected gadgets may be underestimating the real, transformative potential of the Internet of Things.
The Deadly Game of Cyber Mis-Attribution | Digital Guardian
In-brief: Tools to attribute cyber attacks are still primitive – leading to potentially damaging mis-identification. (This post first appeared on the Digital Guardian blog.)
Sabotaging Encryption Software – The Perfect Crime?
In-brief: A report from Bruce Schneier and researchers at the Universities of Wisconsin and Washington surveys the (many) ways that cryptographic protections can be weakened or subverted, and calls for research on fool-proof technologies.