Techspective – With the explosion of internet-of-things (IoT) and connected, industrial IoT (IIoT), and connected, smart home devices, it is getting harder and harder to find things that don’t have some sort of embedded operating system and connectivity today. If it’s a connected device running an operating system, there is a very good chance that an attacker can find a vulnerability to exploit to compromise the device and gain access to your network. That is true even in a best-case scenario where secure development principles and basic security best practices are followed.
Article Categories: ARTICLE
Exploiting Embedded Linux Devices Through the JTAG Interface
Security Boulevard – With the explosion of internet-of-things (IoT) and connected, industrial IoT (IIoT), and connected, smart home devices, it is getting harder and harder to find things that don’t have some sort of embedded operating system and connectivity today. While connected devices can streamline productivity and provide a variety of benefits, they also expose you to risk.
What Can Your Connected Car Reveal About You?
Dark Reading – App developers must take responsibility for the security of users’ data. The smartphone has become the central command center for many people’s lives. A 2020 study found that the average user has 67 apps on their phone — but most people never stop to think about what data those apps contain or how well protected it is.
How Can Popular Robots Be Hacked?
DailyMail – Security research firm IOActive also conducted a study that found roughly 50 vulnerabilities in robots produced by many popular vendors. Overall, these vulnerabilities lead to a plethora of dangers, including the possibility they could be hijacked and used as secretive listening devices or even weapons.
Gaining Root Access on Sierra Wireless AirLink Devices
Techspective – The benefits of Wi-Fi connectivity also come with some unique security challenges—like the issues recently discovered by Ruben Santamarta, a principal security consultant at IOActive, that allowed him to gain root access to Sierra Wireless AirLink devices.
Will Your Airliner Get Hacked?
airspacemag.com – Meet the people who are making sure it won’t. Modern aircraft have sometimes been called computers with wings, and as far back as 1994, long before hacking became high on society’s list of everyday worries, Boeing engineers were having discussions about how to keep malicious software from being introduced into the data network of their newest marvel, the 777 airliner.
Is your trading app putting your money at risk?
welivesecurity.com (by ESET) – A Q&A with IOActive Senior Security Consultant, Alejandro Hernández, who has unearthed a long list of vulnerabilities in leading trading platforms that may expose their users to a host of security and privacy risks.
Hallway Con and Hacking Travel Technology
Techspective – One consequence of the pandemic has been the elimination of large gatherings—meaning no in-person conferences or conventions. Events like Black Hat and Microsoft Inspire made the shift to transition to streaming online—which is great, but does not make up for the networking between peers or the serendipitous conversations that typically occur.
Connected Fleets and Cybersecurity
Verizon Connect – Connectivity, particularly in terms of the Internet of Things (IoT), is positively trending in the trucking industry as fleet managers look to increase productivity and become more agile. But when everything—including smartphones, infotainment systems, in-cab computers and back-end systems—is linked via the internet, the risk also increases.
Everybody loves robots until they start punching people in the face
Wired – During the pandemic, companies flocked to buy robots to care for the elderly, the infirm or the lonely. But researchers have proven that they can be turned into spies or weapons.