Tag: conferences

Identity Management’s Next Frontier: The Interstate

Factory-installed and even aftermarket identity management applications may soon be standard components on automobiles, as the federal government looks for ways to leverage automation and collision avoidance technology to make the country’s highways and roadways safer.   That’s the conclusion of a new report from the Government Accountability Office (GAO), which finds that vehicle to vehicle communications are poised to take off, but that significant security and privacy challenges must first be met, identity management top among them. The report, GAO 14-13 (PDF available here) takes the measure of what the GAO calls “Intelligent Transportation Systems,” including vehicle-to-vehicle (or V2V) technology. The GAO found that V2V technology that allows automobiles to communicate with each other in ways that can prevent accidents has advanced considerably in recent years. Automakers, working with the Department of Transportation, are testing the technology in real-world scenarios. However, the deployment of V2V technologies faces a number […]

Hacking the Nest Thermostat

Is A Nest Botnet In Our Future? A Conversation With IoT Researcher Daniel Buentello

Daniel Buentello is one of the top security researchers out there looking into the security of common, consumer products that are part of the growing “Internet of Things.” Most recently, Buentello has been making the rounds of security cons with a presentation he calls “Weaponizing Your Coffee Pot.” The talk, which Bountello presented at the recent DerbyCon hacker conference in Kentucky and at ToorCon in Seattle in July. That talk was something of a call to arms for security folk to start poking around the growing list of IP-enabled consumer products. Buentello notes that most – including products from large firms like Belkin are insecure by design and in deployment. As we noted when we wrote about Buentello presentation early in October, the interesting stuff here is Daniel’s methodology for reverse engineering the software that runs these commercial developments, which offers something of a blueprint for others to follow.  More recently, Buentello turned his gaze to […]

Google: Android Infections Are Literally One-In-A-Million

The emergence of malicious software for Google’s Android operating system has been one of the biggest security stories of the last two years. But Google is arguing that much of that reporting is hype, saying its own data shows hardly any evidence of infections of mobile devices running Android. Speaking at the recent Virus Bulletin Conference in Berlin, Google mobile researcher Adrian Ludwig presented data that suggests the number of true infections from malicious software are vanishingly small – even in the unregulated independent Android marketplaces. But mobile security experts wonder if Google’s data isn’t burying legitimate security concerns about its mobile operating system. The explosion of Android malware has been so well documented as to become almost a truism in the security world. McAfee in August reported a 35 percent growth in Android malware that included “SMS-stealing banking malware, fraudulent dating and entertainment apps, weaponized legitimate apps and malicious […]

NEST Thermostat-scaled

IDC: 30 Billion Autonomous Devices By 2020

The official “numbers guys” (and gals) of the technology business over at IDC have just come out with a new report on The Internet of Things and it has some eye-popping numbers. Top among them: an (estimated) 30 billion autonomous “connected things” deployed by the end of this decade. The report, “Worldwide Internet of Things (IoT) 2013-2020 Forecast: Billions of Things, Trillions of Dollars” is a market outlook for the IoT ecosystem, which IDC says comprises “intelligent systems, connectivity services, platforms, analytics, and vertical applications” it also includes professional services and security for IoT infrastructures. While IP-enabled things aren’t exactly “new,” the IoT is being driven by factors that haven’t been common previously, namely: ubiquitous, wireless Internet connectivity, regardless of location, notes IDC analyst Carrie MacGillivray. IDC says the trend lines are pointing up in a serious way, with IoT related economic activity to grow at a 7.9% compound annual […]

Bruce Schneier

Losing The Future: Schneier On How The Internet Could Kill Democracy

With his deep background in both cryptography and Internet security, Bruce Schneier is of the most thoughtful commentators on all matters cyber. So revered is he, that he even inspired a list of humorous Chuck Norris-style “Bruce Schneier” facts . In recent months, Bruce has been an invaluable sounding board amid the drip-drip-drip of details of ubiquitous government surveillance stemming from Edward Snowden’s leak of classified intelligence on NSA spying and cyber operations. In this video, from a recent speech Bruce did at the TEDxCambridge event up here in the Boston area, he goes a bit deeper: drawing out the current trend lines like hacktivism, Facebook- and Twitter-fueled popular revolutions, civil war and mass surveillance, and trying to discern what the future might look like. /div> Bruce’s theory: although nimble groups of activists, dissidents and hackers have been more adept at using the Internet and innovative technologies and platforms built on […]