Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
RSA Highlighted Impending IoT Troubles
Newest First  |  Oldest First  |  Threaded View
Ericka Chickowski
50%
50%
Ericka Chickowski,
User Rank: Moderator
4/29/2015 | 3:34:38 PM
Re: Harder and Easier -- Higher Stakes w Control & Safety Implications
Agreed, Some Guy. I think one thing to think about as we move forward and consider safety and reliability issues is that there will be a greater need for interdisciplinary cooperation with engineers, facilities managers, etc in order to manage risk in the physical world incurred by IoT software/firmware vulns.
Some Guy
50%
50%
Some Guy,
User Rank: Moderator
4/29/2015 | 2:22:52 PM
Harder and Easier -- Higher Stakes w Control & Safety Implications
IoT is going to be Harder AND Easier. But more importantly, IoT moves us beyond the Data domain to the Data + CONTROL domains.

Harder is easy to see, as the above points out. At the same time easier because we don't have to wait 30 years to add security after-the-fact like we did with the Internet, and because an IoT device doesn't have to allow any and every application to run. Today anti-virus blacklists the progams we know are bad after we figure it out, but you are allowed to run everything else. Whitelisting is the opposite approach that is called for with IoT -- when you design an IoT device, you know exactly what it should do, so lock it down to never run anything else. (Of course this is just one step in all the things we already know we have to do for IoT. The expectation needs to be that YOU and I won't buy any IoT device that isn't built on security as its foundation.)

The biggest shift has to be in how we think about IoT. It isn't just data and Identity Theft anymore. It's first and foremost Safety, Reliability and components that are going into systems that interface and CONTROL the physical world. If it's only about getting a sensor, actuator, or app to market, and not about doing the due dilligence that every control device has to do, IoT is simply going to fall flat on its face. So to the extent that folks don't do IoT with security as its foundation, the success and growth rate of IoT are going to be directly impacted.
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
4/29/2015 | 4:39:11 AM
Ghosts in the Shells
For years hacker fiction has taken this idea and used it as an ingredient for suspense, projecting even to a time when cybernetic brains might be home to malicious Internet bots on the run.  But then, we asked for this.  Putting everything possible online has been a drive for some time.  What libraries are more loved than those of the ubiquitous TCP/IP stack that appear in every SDK for everything from embedded OS phone and car brains, to fridge, microwave and coffee maker.  Careful, if you have a camera on your fridge footage of the next cup of water you drink might be streamed by the bot hiding there.

It's high time a detailed analysis of these "odd" netizens was performed and a comprehensive index of tech specs for them documented.  The playbook for home security is going to change considerably, and the next uprising of toasters and trash compactors may have nothing to do with AI, but more to do with malware and viruses.  I can only imagine the fun hacks being planned right now in hopes of wreaking domestic havoc, starting with your coffee maker and those rediculous glasses - neither of these belong connected to my favorite stomping grounds!


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7700
PUBLISHED: 2020-08-14
All versions of phpjs are vulnerable to Prototype Pollution via parse_str.
CVE-2020-7701
PUBLISHED: 2020-08-14
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.
CVE-2020-9228
PUBLISHED: 2020-08-14
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information.
CVE-2020-9229
PUBLISHED: 2020-08-14
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information.
CVE-2019-19643
PUBLISHED: 2020-08-14
ise smart connect KNX Vaillant 1.2.839 contain a Denial of Service.