Thomas Brewster over at Forbes has an interesting story this week on a $10,000 bounty that’s being offered for anyone who can hack Tesla’s Model S sedan. The contest is open to all registered attendees of SyScan Conference in Beijing, which takes place later in July. (Conference web site is here.) According to Brewster, the contest is not endorsed by Tesla, nor is the company cooperating in any way. The conference features a number of hacking demonstrations, including at least one on hacking cars: this presentation on strategies for securing Controller Area Network (CAN) based systems – CAN is the most commonly used networking protocol in automobiles. Tesla – which makes the most wired cars on the road – have flirted with both hackers and mod-ers in the past. Notably: this article mentions one car owner’s hack of Tesla’s (really nice) on board touch screen interface. That prompted a warning from […]
Cisco Combines Linux, IOS For Internet of Things
Networking equipment giant Cisco Systems said that it is combining elements of the open source Linux operating system to its IOS firmware, launching a new architecture it calls “IOx” that will connect the billions of intelligent devices that will make up the Internet of Things. The new architecture was announced at Distributech in San Antonio – a trade show for the utility industry, on Wednesday. The company said IOx will make it easier for its customers to connect Internet of Things devices to back-end resources and the larger Internet. As it stands, the Internet of Things ecosystem is fragmented. Intelligent devices like the Nest Thermostat typically communicate back to proprietary cloud resources and might communicate with their surroundings using any one of a number of wireless protocols, including Bluetooth, Bluetooth Low Energy, Zigbee, Z-Wave, and so on. That balkanization has made it hard to create IoT solutions that span different families […]
Are Wearables The Future Of Authentication?
CIO Magazine has an interesting round-up piece that looks at the enterprise impact of wearable technology, which you can read here. Much of this is what you’d expect: FitBit, Google Glass and the (coming) tsunami of smart watches that will soon wash over us. The Cliff’s Notes version is that adoption of wearables will be rapid in verticals that are positioned to leverage the technology early on – such as healthcare and retail. But the piece argues that enterprises risk ‘missing’ the wearable wave in the same way that they ‘missed’ (or at least didn’t plan for) the mobile computing revolution. What might planning entail? Pilots, apparently – maybe of Google Glass or a competing technology. [Read more Security Ledger coverage of wearable technology. ] An interesting side note concerns a possible enterprise ‘killer app’ for wearables; authentication. The article quotes Forrester Analyst J.P. Gownders saying that wearable technology, with integrated biometric […]