Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
RSA Highlighted Impending IoT Troubles
Newest First  |  Oldest First  |  Threaded View
Ericka Chickowski
50%
50%
Ericka Chickowski,
User Rank: Moderator
4/29/2015 | 3:34:38 PM
Re: Harder and Easier -- Higher Stakes w Control & Safety Implications
Agreed, Some Guy. I think one thing to think about as we move forward and consider safety and reliability issues is that there will be a greater need for interdisciplinary cooperation with engineers, facilities managers, etc in order to manage risk in the physical world incurred by IoT software/firmware vulns.
Some Guy
50%
50%
Some Guy,
User Rank: Moderator
4/29/2015 | 2:22:52 PM
Harder and Easier -- Higher Stakes w Control & Safety Implications
IoT is going to be Harder AND Easier. But more importantly, IoT moves us beyond the Data domain to the Data + CONTROL domains.

Harder is easy to see, as the above points out. At the same time easier because we don't have to wait 30 years to add security after-the-fact like we did with the Internet, and because an IoT device doesn't have to allow any and every application to run. Today anti-virus blacklists the progams we know are bad after we figure it out, but you are allowed to run everything else. Whitelisting is the opposite approach that is called for with IoT -- when you design an IoT device, you know exactly what it should do, so lock it down to never run anything else. (Of course this is just one step in all the things we already know we have to do for IoT. The expectation needs to be that YOU and I won't buy any IoT device that isn't built on security as its foundation.)

The biggest shift has to be in how we think about IoT. It isn't just data and Identity Theft anymore. It's first and foremost Safety, Reliability and components that are going into systems that interface and CONTROL the physical world. If it's only about getting a sensor, actuator, or app to market, and not about doing the due dilligence that every control device has to do, IoT is simply going to fall flat on its face. So to the extent that folks don't do IoT with security as its foundation, the success and growth rate of IoT are going to be directly impacted.
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
4/29/2015 | 4:39:11 AM
Ghosts in the Shells
For years hacker fiction has taken this idea and used it as an ingredient for suspense, projecting even to a time when cybernetic brains might be home to malicious Internet bots on the run.  But then, we asked for this.  Putting everything possible online has been a drive for some time.  What libraries are more loved than those of the ubiquitous TCP/IP stack that appear in every SDK for everything from embedded OS phone and car brains, to fridge, microwave and coffee maker.  Careful, if you have a camera on your fridge footage of the next cup of water you drink might be streamed by the bot hiding there.

It's high time a detailed analysis of these "odd" netizens was performed and a comprehensive index of tech specs for them documented.  The playbook for home security is going to change considerably, and the next uprising of toasters and trash compactors may have nothing to do with AI, but more to do with malware and viruses.  I can only imagine the fun hacks being planned right now in hopes of wreaking domestic havoc, starting with your coffee maker and those rediculous glasses - neither of these belong connected to my favorite stomping grounds!


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10062
PUBLISHED: 2021-05-13
The HTMLSanitizer class in html-sanitizer.ts in all released versions of the Aurelia framework 1.x repository is vulnerable to XSS. The sanitizer only attempts to filter SCRIPT elements, which makes it feasible for remote attackers to conduct XSS attacks via (for example) JavaScript code in an attri...
CVE-2020-23995
PUBLISHED: 2021-05-13
An information disclosure vulnerability in ILIAS before 5.3.19, 5.4.12 and 6.0 allows remote authenticated attackers to get the upload data path via a workspace upload.
CVE-2020-23996
PUBLISHED: 2021-05-13
A local file inclusion vulnerability in ILIAS before 5.3.19, 5.4.10 and 6.0 allows remote authenticated attackers to execute arbitrary code via the import of personal data.
CVE-2021-29510
PUBLISHED: 2021-05-13
Pydantic is a data validation and settings management using Python type hinting. In affected versions passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patche...
CVE-2021-23906
PUBLISHED: 2021-05-13
An issue was discovered in the Headunit NTG6 in the MBUX Infotainment System on Mercedes-Benz vehicles through 2021. A Message Length is not checked in the HiQnet Protocol, leading to remote code execution.