Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Internet Of Things Security Reaches Tipping Point
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
8/15/2014 | 9:30:43 AM
Re: Network access point
Good point--the existing not-so-secure devices need retrofitting. Not sure how this would be marketed, but maybe the automakers could provide an IPS in a recall, for instance. We'll see how it all unfolds.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
8/15/2014 | 9:28:50 AM
Re: Network access point
good point, although there could be an after market for automobiles and high-end wearables. It's a brave new world! It sure will be interesting to watch it unfold...
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
8/15/2014 | 9:25:41 AM
Re: Network access point
This is all speculation, of course, but I would think the vendors would have to provide it since consumers shouldn't be expected to know they need to add this security feature, etc. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
8/15/2014 | 9:04:36 AM
Re: Network access point
Kelly, I think there definitely is an emerging market here, although I wonder if it will be targeted to consumers or manufacturers? Maybe both?
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
8/14/2014 | 1:25:18 PM
Re: Network access point
I wonder if this opens the door for a new generation of mini-security tools/apps that are built for IoT's requirements. Heck, Chris Valasek and Charlie Miller built a prototype IPS of sorts that plugs into a car and detects attacks. I'm not sure how quickly the iOT and consumer product vendors can clean up their buggy code, etc., so maybe there's a stopgap option here. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/14/2014 | 1:13:58 PM
Re: Wow
Good strategy. If you are not connected there is no risk, confidentiality and Integrity are satisfied. However this also means security in general failed since we could not talk about third leg of security: Availability.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/14/2014 | 1:10:15 PM
Re: Wow
I hear you. Low tech devices are main drivers for the security holes at the same time. They even found vulnerability in a flash drive, which is HW mainly, anything can happen from that point forward.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/14/2014 | 1:07:22 PM
Network access point
 

One way of avoiding problems that would be coming from IoT is to build a secure network and not allowing all these small devices connecting internet by themselves. This is what we do at work and home currently actually. What is important is to make sure there is only one gateway and that gateway is secured properly.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
8/13/2014 | 6:49:51 PM
Re: Wow
I have a fairly low-tech house and vehicles, so sadly, that makes me feel better. But most consumers have no idea that their smart thermostat, or their fully loaded vehicle could be compromised or used as a bot to attack others. They're having a tough enough time coming to terms with their PCs as targets. The security researchers who've explored weaknesses in consumer and other embedded devices are concerned about how this could play out. That's why it's promising to see I Am The Cavalry and BuildItSecure.ly, plus other outreach efforts. So don't unplug yet, Sara!
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
8/13/2014 | 5:45:52 PM
Re: Wow
Historically, manufacturers haven't gotten around to taking public safety seriously until they start losing product liability suits. The legal concept of "due care" should definitely be applied to the connected "things" that we use everyday and will be increasingly the target of hackers, criminals and other bad actors.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-40865
PUBLISHED: 2021-10-25
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x use...
CVE-2021-25977
PUBLISHED: 2021-10-25
In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution.
CVE-2021-35231
PUBLISHED: 2021-10-25
As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHIN...
CVE-2021-38294
PUBLISHED: 2021-10-25
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
CVE-2021-40526
PUBLISHED: 2021-10-25
Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead t...