Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
IoT Security: How Far We've Come, How Far We Have to Go
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
tlanowitz
50%
50%
tlanowitz,
User Rank: Author
1/24/2020 | 11:58:04 AM
Need for a Shared Security Model
This insightful article exemplifies the need for a shared security model. In a shared security model, the enterprise assumes responsibility for devices (IoT in this example) on the network. And, with a 5G network, which will allow IoT initiatives to gain momentum in the market, the network operator is responsible for the elements of security listed out in 3GPP frameworks and standards (i.e. data encryption and radio access network) as well as the handling the security of the network infrastructure.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/30/2019 | 1:08:01 AM
Re: Printers
Any IoT device needs to be secured and patched but you're right, these things way to often take a backseat to more conventional infrastructure.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/30/2019 | 1:06:59 AM
Re: Open-source
True, unfortunately the flipped side to that easier to attack coin is that it makes it easier for individuals with more altruistic intent to make a product better than its original form because they have access to the source code.

The dichotemy of the human element is truly astounding to behold.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/30/2019 | 1:04:33 AM
Re: DDoS
It's funny you should mention this because I brought this up in a response to one of your other posts. I don't think people outside of the security realm fully comprehend how easy it is to launch a DDoS attack. Very little effort or technical inclination is required and even without those two items you could sub it out using a Remote Access Tool for hire.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/30/2019 | 1:02:25 AM
Re: POS
Couldn't agree more. Unfortunately with POS being targets of DDoS and Ransomware, two very simplistic attack methods, they are subject to be targeted by any script kiddy looking for a thrill, all the way up to attackers with more nefarious intentions.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/30/2019 | 1:00:46 AM
Re: Patch management
To add to this I think most corporations are not certain where to start. I gave a speech this summer at a security conference that touched on Vulnerability and Patch Management and many were unsure before the topic on how the two were different.

Vulnerability Management highlights the exposures and provides the method for which to remediate them. This is to be performed by the Security Practioner.

Patch Management is to be performed by someone in SysOps or SysEng and NOT to be performed by the security team. 

Providing this data at a high level because I could go on at length about how pivotal it is to optimize these two programs within corporations to stay ahead of the curve.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/29/2019 | 2:32:43 PM
Patch management
Many companies continue to struggle with patch management efforts, And greatly fail. Most of us not up to date in a timely manner, and that is one of the main reasons we have the problems today.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/29/2019 | 2:30:44 PM
POS
Criminals are narrowing their focus on IoT, evolving from ransomware or point-of-sale malware to specifically targeting connected devices. POS devices are target for both DDoS and ransomware, their firmware needs to be up to date.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/29/2019 | 2:24:55 PM
DDoS
who are targeting firmware at scale or leveraging connected devices in DDoS attacks. DDoS is one of the primary problems in IoT world, easy to execute and maximum damage.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
12/29/2019 | 2:18:47 PM
Open-source
it's open-source and free, so attackers don't have to work very hard. This is one of the problem with open-source, we know what is happening in the code so easier to hack.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.