IoT

Mikko Hypponen's Vision of the Cybersecurity Future

0%
100%

BLACK HAT USA 2017 -- Twenty years from now, will everything be a thing in the Internet of Things? If so, how does the security industry need to prepare? F-Secure's chief research officer Mikko Hypponen visits the Dark Reading News Desk to weigh in on this, and what else the future promises (and threatens).

Watch all 45 News Desk interviews at DarkReading.com/DRNewsDesk.

Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Click for more info and to register.

Comment  | 
Print  | 
Comments
Threaded  |  Newest First  |  Oldest First
tcritchley07
50%
50%
tcritchley07,
User Rank: Moderator
9/5/2017 | 9:19:29 AM
Mikko Hypponen;s Security Talk
Much as I respect his position, I think he is talking linearly and not laterally. E,g. "I cant see SW in IOT devices". Nobody could see men landing on the moon 100 years ago be we did. IOT devices in a year or so can easily hold a 128 MB /(or GB) memory/storage and enough briains to  encrypt data and commands and to take part in a later cyber security architecture, However, the IoT manufacturers will have to toe the IoT function implementation line drawn by Goverments and businesses who carry very large sticks in the pursuit of security.

Even today, the bad guys are practising their IoT breach skills, e.g. Iranian nucclear plant, Ukraine power station, cars stopped in 'flight'  (by friendly hackers as a trial). They are an order of magnitude greater hazard than current exposures and 2 orders of magniude in number.
menuisier69
50%
50%
menuisier69,
User Rank: Apprentice
9/6/2017 | 5:15:43 AM
Re: Mikko Hypponen;s Security Talk
"Much as I respect his position, I think he is talking linearly and not laterally"

 

100% agree but Mikko Hypponen is still a genius :P
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Why the CISSP Remains Relevant to Cybersecurity After 28 Years
Steven Paul Romero, SANS Instructor and Sr. SCADA Network Engineer, Chevron,  11/6/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19220
PUBLISHED: 2018-11-12
An issue was discovered in LAOBANCMS 2.0. It allows remote attackers to execute arbitrary PHP code via the host parameter to the install/ URI.
CVE-2018-19221
PUBLISHED: 2018-11-12
An issue was discovered in LAOBANCMS 2.0. It allows SQL Injection via the admin/login.php guanliyuan parameter.
CVE-2018-19222
PUBLISHED: 2018-11-12
An issue was discovered in LAOBANCMS 2.0. It allows a /install/mysql_hy.php?riqi=0&i=0 attack to reset the admin password, even if install.txt exists.
CVE-2018-19223
PUBLISHED: 2018-11-12
An issue was discovered in LAOBANCMS 2.0. It allows XSS via the first input field to the admin/type.php?id=1 URI.
CVE-2018-19224
PUBLISHED: 2018-11-12
An issue was discovered in LAOBANCMS 2.0. /admin/login.php allows spoofing of the id and guanliyuan cookies.