Security News
Advanced building controls can help keep air clean to reduce the risk of the spreading coronavirus indoors while sensors can send an alert if a room goes over capacity.
The new technique provides possibility to analyze data directly on compressed files, and it may have a major impact on the so-called "Data tsunami" from massive amounts of IoT devices. "Today, if you need just 1 Byte of data from a 100 MB compressed file, you usually have to decompress a significant part of the whole file to access to the data. Our technology enables random access to the compressed data. It means that you can access 1 Byte data at the cost of only decompressing less than 100 Bytes, which is several orders of magnitude lower compared to the state-of-the-art technologies. This could have a huge impact on data accessibility, data processing speed and the cloud storage infrastructure," says Associate Professor Qi Zhang from Aarhus University.
The exponential growth of IoT devices brings a new challenge: how to effectively manage and monitor large numbers of connected devices that may be hard to access in widely-scattered remote locations? To answer this challenge, Innodisk has combined its expertise with DFI, to bring DFI's RemoGuard remote management system to its customers.
Details tied to a pair of remote code execution bugs in Microsoft's IoT security platform called Azure Sphere were released Monday. Public disclosure of all four of the bugs piggyback on six vulnerabilities found in July also impacting Microsoft's Azure Sphere.
The burgeoning smart home device market has given rise to digital intrusion and potential energy market manipulation on a massive scale. By 2025, it's been estimated that there will be 481 million smart homes worldwide, according to a Statista's 2020 Digital Market Outlook.
According to a report by ABI Research, asset tracking device shipments will see a 51% year-on-year device shipment growth rate through 2024. Expanding LPWAN coverage, technological maturity, and the associated miniaturization of sophisticated devices are key to moving asset tracking from traditionally high-value markets to low-value high-volume markets, which will account for most of the tracker connection and shipment numbers.
Laws have been passed to prevent truckers from driving long distances without enough sleep, keeping us all safer on the road. In 2015, the Federal Motor Carrier Safety Administration issued requirements for trucking companies to attach electronic logging devices to trucks. They left open the safety and security of the IoT devices that businesses were purchasing and using.
A vulnerability in Thales' Cinterion EHS8 M2M module, a Java-powered embedded 3G system used in millions of Internet-of-Things devices for connectivity, was revealed yesterday by IBM's X-Force Red. The bug, disclosed to Thales and addressed in a patch made available to IoT vendors in February, makes it possible for an attacker to extract the code and other resources from a vulnerable device.
More than 50% of organizations say that security is a main reason they have not taken advantage of IoT. Fortunately, with new technology and new networks, enterprises don't have to choose between valuable business insights and organizational security anymore. If IoT devices are reporting critical information frequently - say, four or five times every hour - that poses a larger security risk than devices that only need to communicate information two or three times a day.
Researchers are urging connected-device manufacturers to ensure they have applied patches addressing a flaw in a module used by millions of Internet-of-Things devices. "Some of these will be the vulnerable module, and an attacker will then have an assortment of phone numbers and associated code retrieved from the device at that number. By inserting backdoors into the code and writing them back, the attacker would be in control of various IoT devices around the world."