Tag: data privacy

Updated: Google warns of unauthorized TLS certificates trusted by almost all OSes | Ars Technica

In-brief: Google warned its users that unauthorized digital certificates have been issued for several of its domains. The certificates are linked to an intermediary certificate authority for CNNIC, which administers China’s domain name registry. Updated with comment from Kevin Bocek of Venafi. Paul 3/27/2015 

Could Moore’s Law Solve The IoT Security Problem?

There’s an interesting roundup piece on Internet of Things security by Nermin Hajdarbegovic over at the technical jobs site Toptal. Hajdarbegovic provides a summary of some of the recent IoT reports – by Kaspersky Lab (the “Internet of Crappy Things” report, FTC Chairwoman Edith Ramirez and Wind River. (We covered the FTC and Wind River reports here and here.) It’s worth a read. Hajdarbegovic is mostly optimistic about the future of the Internet of Things and the ability of the “market” to address the security and privacy issues that currently exists. From his blog post: “As the IoT market grows, we will see more investment, and as hardware matures, we will get improved security. Chipmakers like Intel and ARM will be keen to offer better security with each new generation, since security could be a market differentiator, allowing them to grab more design wins and gain a bigger share. “Technology […]

Digital ‘Exhaust’ may be the biggest Internet of Things Worry | WIRED

In-brief: digital ‘exhaust’ emitted by Internet of Things technologies may pose the biggest risk to personal privacy and security a researcher warns. 

Cyber Lemons: Lawsuit alleges Hackable Cars Pose Risks to Consumers

  In-brief: A lawsuit filed in California charges U.S. automakers with endangering their customers by failing to protect ‘connected vehicle’ features from cyber attack. 

The Enterprise IT Security Continuum

In-brief: Cisco executive Marc Blackmer argues that advanced threats and the coming Internet of Things will put more pressure on IT organizations to fight cyber threats along a continuum that includes blocking, detection and remediation.