How does an Amazon Echo vulnerability enable attackers to eavesdrop?

Research from MWR InfoSecurity Ltd. shows that threat actors can install malware on an Amazon Echo and turn it into a listening device. How effective is this attack, and is there any way to determine if an Amazon Echo has been compromised?

Read More

Blockchain for IoT extends beyond ensuring security

Blockchain, the technology that made Bitcoin possible, has been getting a lot of attention in the IoT world, often because of its role in security. However, experts and practitioners said the potential of blockchain for IoT is deeper and broader than just keeping the bad guys out.

Read More

Product manufacturers: It's time to rethink the IoT user interface

The disciplines of user interface, industrial design and human­machine interaction were born more than 20 years ago, in a world of desktop computers and heavy machinery. Yet, our notion and understanding of what it means to interact with technology, particularly the internet, are transforming radically. Our interactions are shifting from laptop to mobile and increasingly across other devices and connected form factors. As we add sensors and connectivity to our bodies, appliances, homes, cars, buildings, machines and just about everything else, interaction with the internet grows evermore indistinguishable from interaction with our physical world.

Read More

Is Your IoT Device Spying on You?

I was born on the cusp of the internet revolution. As a kid, my friends and I roamed the streets and were more or less off the grid. Once we left the house, we were untraceable. We had to run to a friends house or a pay phone (remember those?) to get in touch with a parent.

Read More

IoT security vulnerabilities turn hospital CIOs' dreams into nightmares

A connected healthcare where patients can transmit data back to their physician to monitor their vitals after leaving the hospital has been a dream for many. The ability to leverage connected devices to capture and transmit relevant health information from a patient's heart monitor while at home or record oxygen levels while in the operating room shows the power of medical devices. But with the recent debilitating distributed denial of service attacks against some of the top DNS servers, such as those used by Amazon, many IT executives have had to question whether or not their IoT strategy is still safe or even possible.

 

Read More