In-brief: GE Healthcare’s Chief Technology Officer said his company is modeling its product security program on Microsoft’s Trustworthy Computing program – and tapping the Redmond company for experts to help them do it.
Tag: vulnerabilities
The New York Times: Internet of Things Security a Challenge to Civilization
In-brief: Steve Lohr at The New York Times had an interesting piece on security for the Internet of Things this week, noting that Internet of Things security poses a challenge to civilization. Steve Lohr at The New York Times had an interesting piece on security for the Internet of Things this week, which I’ve linked to. From the article: The optimistic outlook is that the internet of things will be an enabling technology that will help make the people and physical systems of the world — health care, food production, transportation, energy consumption — smarter and more efficient. The pessimistic outlook? Hackers will have something else to hack. And consumers accustomed to adding security tools to their computers and phones should expect to adopt similar precautions with internet-connected home appliances. “If we want to put networked technologies into more and more things, we also have to find a way to make […]
12 Years Later: Common Configuration Flaw + Internet of Things = Massive Attacks
In-brief: A common configuration flaw may be behind a massive network of IoT devices used in “credential stuffing” attacks, according to the security firm Akamai.
European Commission Ponders Security Labels for IoT | EurActiv.com
The web site EurActiv.com is reporting that the European Commission (EC) is getting ready to propose new legislation to protect machines from cybersecurity breaches. Among the steps they’re considering: labels for Internet-connected devices that tell consumers they are “approved and secure.” Products across industries from energy and consumer goods to automotive and healthcare could eventually be required to use the labels on their products, just as electrical devices currently contain labels that inform consumers how much power they use, EU officials said. Digital policy chiefs Günther Oettinger and Andrus Ansip presented a plan three weeks ago to speed up internet connections to meet the needs of big industries like car manufacturing and agriculture as they gradually use more internet functions. But lawmakers recognize that the transition to more and faster internet connections has caused many companies to worry that new products and industrial tools that rely on the internet will be more vulnerable […]
Shoddy Supply Chain Lurks Behind Mirai Botnet
In-brief: A common, China-based supplier of management software is the common thread that ties together the myriad digital video recorders, IP-based cameras and other devices that make up the Mirai botnet, according to analysis by the firm Flashpoint.