Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
DoJ Announces Team To Oversee Security Of Internet of Things
Newest First  |  Oldest First  |  Threaded View
koconnor100
50%
50%
koconnor100,
User Rank: Apprentice
9/26/2016 | 9:55:37 AM
Re: DoJ, NSA , it's all USGov
"You're demanding privacy and secrecy for yourself but that the same time denying the government of it even though they might be trying to defend your life with the same technology you only want to use to hide your selfies."


After Ferguson Missouri, trust in the US Government is hard to come by.

It wasn't just one cop that shot a black man there, it was the entire towns political structure, elected mayor, council men, etc etc, protecting that cop because he was doing precisely what they ordered him to do.

And that will shake your faith in any organization.
koconnor100
50%
50%
koconnor100,
User Rank: Apprentice
9/26/2016 | 9:51:26 AM
Re: DoJ, NSA , it's all USGov
My "exaggerated self importance" is that I am a human being and they (NSA)  want a profile of EVERY HUMAN BEING on the planet.

I don't claim to have any special importance over my next door neighbours, I merely claim to be a normal human being .

 

:)
jcavery
50%
50%
jcavery,
User Rank: Moderator
9/20/2016 | 9:54:25 AM
Re: DoJ, NSA , it's all USGov
You're right, they would like to collect every byte of data.... and they probably could.... but they don't. There is a little paranoia in your post, exagerrated self importance, worrying that they are watching you, out of all the terrorists out there they actually are following. There is not enough manpower in the intelligence community to watch every person on the planet with the intensity and focus they apply to suspicious people. I don't remember hearing about any fire alarm bugs, microphones, or cameras regarding the snowden leaks. I have been through the spy museum in D.C., and they used some really sneaky technology back then too, with amazing stories of how they were used to prevent international massacres. I wonder how effective those ideas would have been if the enemy knew to look out for it, and knew exactly how to defend against it? Liberty is important, but we still need to be careful about inventing effective secrets, and then just giving them away. You're demanding privacy and secrecy for yourself but that the same time denying the government of it even though they might be trying to defend your life with the same technology you only want to use to hide your selfies.
koconnor100
100%
0%
koconnor100,
User Rank: Apprentice
9/19/2016 | 9:35:39 PM
DoJ, NSA , it's all USGov
Thanks to Edward Snowden it is now known world wide that the government of the USA , no matter which particular branch, would like to collect every byte of data everywhere on the planet.


As we sit hear reading this article, after reading yet another artical on the lastest of DDOS attacks and ransomware demands, one has to wonder why anyone would ever by anything even connected with IoT (internet of things).


My fear is that this kind of thing will be forced onto us. Everything will be IoT , with no way to turn it off.

In Canada , in Ontario , for example , it is the law that you have to have a fire alarm in the apartment. And those things are just a speaker , a circuit board with a few chips, and a line heading out to the central machine downstairs. We have no idea what those chips do. And looking it up in a book just tells us what they want us to think. And looking at the label reading "made in the USA" doesn't inspire us with confidence. As far as we know they put a listening device in every apartment in Canada.


Paranoid ? Maybe before Edward Snowden it was. But it is technically possible, and NSA is going on about how it wants to gather all data everywhere.


Even the regular internet is becoming increasingly unstable. IoT has a dark future indeed.


How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3331
PUBLISHED: 2021-01-27
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
CVE-2021-3326
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2021-22641
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22653
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22655
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).