The Internet of Things (IoT) promises to make life more convenient, but where does security fit in? With that convenience comes the potential of a huge headache. While the promises are great, so are the opportunities for hacking into the very convenience that can make life less difficult.
Several years ago, bed bugs in the fanciest of New York City hotels put thousands of travelers on edge. Pest services made a lot of money, as did retailers who sold bedding products. Bugs are back, but instead of infecting mattresses and pillowcases, they’ve worked their way into devices that are part of the Internet of Things. Many of today’s Internet of Things (IoT) of those connected devices, from connected crock-pots to refrigerators, are riddled with security flaws, leaving them vulnerable to attacks, according to research by Scott Tenaglia and Joe Tanen from Invincea Labs in Virginia
A cascading string of distributed denial-of-service (DDoS) attacks—most recently taking down parts of hundreds of sites including Twitter, Netflix, Spotify, Airbnb, Reddit and The New York Times—has demonstrated record-breaking volumes that are overwhelming website defenses. The four-fold growth in attack size over the last year is being driven by hundreds of thousands of internet-connected devices hackers are adding to their botnets, according to industry sources.
Executives from the Internet of Things (IoT) and security industries gathered in Chicago last week for the Smart Card Alliance’s2016 Security of Things conference, where they provided insights and perspectives on security, privacy and authentication in the rapidly growing IoT ecosystem.
The security and privacy of IoT-enabled devices is a popular topic amongst connected car manufacturers, smart home developers and connected wearables. But as seemingly harmless things like Barbie dolls, stuffed animals and toy droids become connected to the IoT (and they are), what measures are being taken to ensure the security and privacy of those devices, if any? And is security a concern for something so ordinary?
If you’re designing a connected device for the Internet of Things (IoT), there are six key IoT design mistakes to avoid, Gianfranco Bonanome writes on TechTarget’s IoT Agenda. Bonanome addresses points such as whether you should even connect your device, if your design is scalable, and most importantly, when to consider your security approach.
The things that make the Internet of Things (IoT) so great – the ability to connect, automated data sharing, the increasing number of connected devices, the endless opportunities for innovation – are also the things that make IoT vulnerable.
What do we need to do as an industry to secure IoT? Accenture’s latest brief, “Security Call to Action: Preparing for the Internet of Things,” says the most challenging aspects involve the IoT’s sheer expanse, and the diversity of industries and use cases it embraces. What does this mean for security? There is no one-size-fits-all solution.
Too often, security is an afterthought in emerging markets experiencing rapid growth and lacking strong standards and regulations. With 21 million connected devices expected to be in the market by 2020, and no standards in place, the Internet of Things (IoT) falls into that category.
Smart door locks that can be opened remotely without a password. Potential vulnerabilities of hundreds of millions televisions to fraud or even ransomware. A recall of 1.4 million cars to help prevent vehicle takeover.
In a world where connected devices are expected to reach 21 billion by the year 2020, we’re at a critical turning point where we need to ensure security is a top priority in Internet of Things implementations.
As a content portal featuring relevant news, resources, expert commentary and thought leadership on the security and privacy of the Internet of Things (IoT), we accept and encourage contributed content from both Smart Card Alliance members and non-member companies. If you are interested in contributing, please review our Contributor Q&A, and submit your story idea or draft to Adrian Riley at email@example.com. We look forward to reading your submission!