Security Boulevard – A protocol little known by executives outside of the networking world may put the future safety of enterprise IoT at extreme risk if organizations don’t take action to secure their connections. New research out last week found that the way that many large organizations are using the Long Range Wide Area Networking (LoRaWAN) protocol is making them susceptible to hacking that could cause civic disruption and even put people at risk.
IoT News – A new research paper from IOActive has found a host of cybersecurity issues in the LoRaWAN protocol that could put network users at risk of attacks. The study, titled ‘LoRaWAN Networks Susceptible To Hacking: Common Cyber Security Problems, How To Detect And Prevent Them’, warned widespread disruption and even risk to life could occur in some extreme cases.
SecurityWeek – Millions of devices deployed across a wide range of sectors could be exposed to hacker attacks due to security issues associated with the use of LoRaWAN, cybersecurity firm IOActive warned on Tuesday. LoRaWAN, which stands for long-range wide area networking, is a media access control (MAC) protocol that uses LoRa technology to allow low-power devices to wirelessly communicate with internet-connected applications over long distances.
Stacey on IoT Podcast – Privacy was a big theme beginning with our conversation about Ring’s sharing of certain user data with third-party tracking sites, a plea from 40 organizations for the U.S. to stop using facial recognition technology, and a new way to think about smart cities. Kevin and I also discussed proposed device security rules for the U.K. and security challenges associated with LoRaWAN networks.
Dark Reading – The fast-emerging long-range wide area networking (LoRaWAN) protocol — designed to wirelessly connect low-power, battery-operated “things” to the Internet — is dangerously vulnerable to widespread attacks and compromise, security firm IOActive said in a report Tuesday. According to the vendor, its research shows that the encryption keys used for securing communications between devices, gateways, and network servers in LoRaWAN environments are weakly protected and easily obtainable.