Security News
What is needed are solutions that provide device-level security that addresses all the technical, IP, supply chain and business process challenges manufacturers face without the need for them to become experts in cryptography and complex hardware security technologies themselves, say experts at Sequitur Labs. "IoT device developers need to ensure their products are protected from attacks, safe and secure through the manufacturing process, and able to be managed securely throughout the life of the product," said Philip Attfield, Co-founder and CEO, Sequitur Labs.
The FIDO Alliance announced the launch of the FIDO Device Onboard protocol, a new, open IoT standard which will enable devices to simply and securely onboard to cloud and on-premise management platforms. Of the 170 IoT leaders surveyed, they found that 85% say security concerns remain a major barrier to IoT adoption.
We need to understand every packet, bit, flow, application, interaction on the network as well as device and user interactions. Through vigilant monitoring and baselining of behavior, we can better understand at-risk devices and behavior and act quickly to limit or prevent infection.
On Thursday the ioXt Alliance, an Internet of Things security trade group backed by some of the biggest names in the business, introduced a set of baseline standards for mobile apps, in the hope that IoT security may someday be a bit less of a dumpster fire. The announcement of the new Mobile Application Profile [PDF], a certification program covering best practices and requirements to keep mobile apps safer than the low bar of vendor discretion, comes from the collaboration of more than 20 ioXt member companies like Amazon, Comcast, Google, and others.
ID R&D announced that its passive facial liveness detection product, IDLive Face, now runs on the NVIDIA Jetson XavierNX. The small form factor system-on-module supports multiple AI neural networks running in parallel and trillions of operations per second, resulting in faster processing and lower hardware costs when deploying face biometrics with liveness detection on embedded IoT and edge computing systems. Support for IDLive Face on Jetson Xavier NX mitigates size, power, and cost constraints that have limited the ability to deploy and scale face biometrics in standalone devices.
Even the most limited and self-contained test networks quickly end up crying out for DNS, and if ever you want to hook up your device or devices to the internet, you can consider DNS support a must. That's why any TCP/IP device, no matter how tiny and resource-constrained it might be, and any operating system, no matter how much it might have been miniaturised, includes code for what's known as DNS resolution or DNS lookup.
Security researchers have uncovered nine vulnerabilities affecting four TCP/IP stacks impacting more than 100 million consumer and enterprise devices that could be exploited by an attacker to take control of a vulnerable system. "These vulnerabilities relate to Domain Name System implementations, causing either Denial of Service or Remote Code Execution, allowing attackers to take target devices offline or to take control over them," the researchers said.
The 5G IoT market size is projected to grow from $2.6 billion in 2021 to $40.2 billion by 2026, at a Compound Annual Growth Rate of 73.0% during the forecast period, according to MarketsandMarkets. The increasing number of IoT-connected devices and agile networks, network slicing, and private 5G networks among the emerging technologies is expected to shape the future of the 5G IoT market.
Glassbeam announced it is working closely with Deloitte in a strategic ecosystem relationship to meet the urgent business needs of customers in the healthcare IoT analytics sector. Glassbeam and Deloitte will help healthcare organizations drive higher Return on Assets by deploying Glassbeam's Clinsights solution which delivers improved machine uptime and utilization across an entire fleet of medical equipment.
Q4 2020 also brought a 41% increase in encrypted malware detections over the previous quarter and network attacks hit their highest levels since 2018. "The attacks are coming on all fronts, as cybercriminals increasingly leverage fileless malware, cryptominers, encrypted attacks and more, and target users both at remote locations as well as corporate assets behind the traditional network perimeter. Effective security today means prioritising endpoint detection and response, network defences and foundational precautions such as security awareness training and strict patch management."