Samsung buys Harman for $8bn

Samsung logo building

In an effort to expand into the auto market, Samsung has announced that it will purchase Harman for $8 billion to gain access to both its automotive and audio offerings.

The American company Harman is best known for its audio equipment, though it also has a large presence in the automotive market. Last year, the company earned over $7 billion, of which its connected car devices and audio systems accounted for 65 percent of the total sales.

Continue reading

Comodo launches new certificate management platform

Business security

Digital certificates are an essential part of online security and as the number of Internet of things devices continues to grow they'll become more important still. But as we rely more on certificates so managing them becomes more complex.

Cyber security solutions company Comodo, the world's leading certificate authority, is launching the latest release of its Comodo Certificate Manager (CCM), a full-lifecycle digital certificate management platform which makes it easier for enterprises to manage their certificates.

Continue reading

Philips Hue lights can spread IoT worm

Philips Hue iPhone

Philips Hue light bulbs could be vulnerable to a cyber attack, according to researchers who have developed a proof-of-concept worm capable of spreading from bulb to bulb with the power to turn the lights on and off.

The researchers efforts at gaining access to the connected light bulbs was detailed in their paper titled IoT Goes Nuclear a ZigBee Chain Reaction. The worm they created was able to gain access to the Philips Hue devices by exploiting hard-coded symmetric encryption keys that are used to control devices over Zigbee wireless networks.

Continue reading

Be aware of these threats from the Internet of Things

Internet of Things IoT

Have you ever imaged your refrigerator or coffee maker being a threat to you? Probably not. That’s a problem of sci-fi and the future, right?

With the Internet of Things (IoT), the future is becoming the present. More and more IoT devices are coming into everyday life. We pay attention to how convenient it is for our thermostat to know when we’re coming home and therefore turn on the air or heating, and how our jackets can tell us about our health. We often don’t pay attention to how it transmits that information to an outside source. The IoT is a huge advantage for the modern world, but it has some dangers as well. Here are five that you should be on the lookout for.

Continue reading

IoT security is an afterthought

IoT devices

What once was the plot of creative Hollywood blockbuster movies is now becoming a reality. The Internet of things (IoT) continues to grow as consumers, businesses and governments recognize the benefit of connecting devices to the internet, be it smart phones, wearable devices or smart homes. It is estimated that the number of connected devices in use by 2020 will be 30 billion, one in five cars will be connected vehicles in the next five years and by 2025 the IoT is predicted to have a global economic impact of US $11trillion.

The growing presence of connected devices is increasing efficiency in homes, workplaces and other areas of life that have seen the introduction of the IoT. Despite the expansion of connected devices however, there remains a number of consumers who are reluctant to adopt the IoT due to security concerns.

Continue reading

Ubuntu Core 16 IoT-focused Linux distro finally available for PC and Raspberry Pi

UbuntuCoreSnappyLinux

Last month, Canonical released a beta of Ubuntu Core 16. This is not a typical Linux distribution, but instead, one that is focused on Internet of Things and the cloud. What makes the operating system particularly interesting is the use of "Snaps" -- an ingenious modular way of handling software. It combines applications and dependencies into one convenient package.

Today, Ubuntu Core 16 achieves final release status. You can download it immediately for free for PC, Raspberry Pi, and more. With all of the IoT-related botnet news nowadays, this is arriving at the perfect time.

Continue reading

Number of DDoS attacks down but speed and size increases

DDoS attack

The number of DDoS attacks fell more than 40 percent to 97,700 attacks in the second quarter of 2016 according to the latest threat report from DDoS security service Nexusguard.

The report reveals there was a sharp dip in distributed reflection denial of service (DrDoS) attacks, with DNS-based attacks falling 97 percent compared to the previous quarter. However, recent DDoS attacks on cybercrime journalist Brian Krebs and OVH, a French internet hosting provider, broke records for speed and size.

Continue reading

What you need to know about Internet of things

IOT Internet of Things

The Internet of things is predicted to revolutionize the way in which we live our lives, with many industry experts tipping it to have the biggest technological impact since cloud computing.

The reason behind such a bold claim is that IoT devices have the potential to be more pervasive than any other form of technology. By embedding Internet connectivity into everyday objects we can open every facet of our lives to technological innovation. In truth, it is impossible to say with certainty what the future impacts of this will be, and there are just as many Internet of things doomsayers as there are enthusiasts.

Continue reading

The seven IoT devices that could be putting your business at risk

Risk dial

We've already seen concerns about the threats Internet of Things gadgets may pose in the home, with hackable Barbie dolls and snooping Smart TVs. Not to mention that the latest Dyn DDoS attack was carried out using unsecured IoT devices.

IoT devices are starting to become commonplace in businesses too so the potential for problems can only grow. Security company ForeScout, along with leading ethical hacker Samy Kamkar, has been investigating the risks these devices pose.

Continue reading

Say, what's going on at Intel Capital Global Summit 2016?

Question

San Diego, Calif. As a general rule I never connect to public WiFi networks, which is fine except when attending an event at a hotel ballroom where T-Mobile cellular is like an apparition dancing around a Halloween grave. So as Wendell Brooks, CEO of Intel Capital, begins his speech, I sit typing narrative offline rather than tweeting live. There’s irony, I suppose, reporting old style, about investments in new innovations.

Welcome to the trials and travails of the Intel Capital Global Summit, which kicks off today and goes through October 26. Looking at the lineup, I expect to hear about newfangled tech that would make news reporting so much easier if available—although 4G cellular data would be good enough for today.

Continue reading

Businesses find IoT devices hard to secure

Keyboard unlock open lock button pin

Internet of things (IoT) is expected to make an enormous impact on pretty much every industry in the upcoming months and years, but it seems as organizations don’t really know how to secure their devices. This is according to a new report by ForeScout Technologies, which surveyed 201 senior IT decision makers in the UK, Germany, Austria and Switzerland.

First, the report says the threat surface is going to increase dramatically. An average business will operate 7,000 IoT devices in the next 18 months, which is "far more" than what the average company is used to securing and defending. Second, almost two thirds (65 percent) have "quite", "little", or "no" confidence in identifying and controlling their IoT devices. And third, the biggest challenge seems to be having IT functions working together.

Continue reading

Hackers use old SSH vulnerability to attack Internet of Things devices

IoT devices

There is a 12 year old vulnerability in OpenSSH that hackers are now using to attack Internet of Things (IoT) devices and remotely generate traffic. Akamai Technologies' researchers Ory Segal and Ezra Caltum have identified the old vulnerability and dubbed it SSHowDowN Proxy.

The researchers say hackers are using it to target CCTV, NVR, and DVR devices, satellite antenna equipment, networking devices such as routers or hotspots, and internet-connected NAS devices.

Continue reading

Mirai botnet code used to launch DDoS attack on Krebs On Security leaks online

ddos_attack

Fears are mounting that there could soon be a rise in large scale DDoS attacks after the source code used to launch the recent crippling attack on Krebs On Security was shared on a hacker forum.

Brian Krebs' website was hit by what has been described as the largest ever DDos attack recently, and the Mirai botnet source code has now been made available for anyone to make use of. The style of attack is particularly interesting as it involves using compromised Internet of Things devices such as webcams and other connected IoT hardware.

Continue reading

Security commentator Brian Krebs hit with the biggest DDoS attack ever

ddos_attack

Attacks on websites are a daily occurrence so to get any real attention an attack needs to be something special. Starting on Tuesday, Brian Krebs' security blog, KrebsOnSecurity.com, was hit with what is being described as "the largest DDoS the internet has ever seen".

Despite being clobbered with a colossal 665 Gbps of traffic, Krebs' site remained online thanks to the anti-DDoS efforts of security firm Akamai. It is thought that Krebs was targeted for his exposés of hackers, and the attack was delivered via a huge number of hacked IoT devices.

Continue reading

Time to learn Pig Latin, your devices are listening

Listen

While it’s convenient to turn lights on, lock doors, check humidity levels and monitor energy use in your home with your smartphone, those conveniences come at a cost; even something as seemingly harmless as monitoring calorie burn with a connected device can lead to a breach. Billion dollar companies are having a hard time shielding themselves against hackers, insider threats and data leakage, let alone a single device in your home.

When you register devices and tie them to your email account and address you are opening that information up to be invaded. Additionally, fitness trackers are revealing whether you have met your goals, coffee pots are recording how quickly you go through your favorite brew and thermostats are recording what time of day you are home. All of this information is valuable to companies because it can be sold to other businesses that can customize ads to fit the data you are inadvertently feeding them. Even the FTC has expressed concerns over what the Internet of Things will mean for the future of privacy and security. 

Continue reading

Load More Articles