How to Fix the Many IoT Security Gaps That Nobody Is Thinking About

Found on eWEEK on Saturday, 12 September 2015
Browse Technology

Nobody really knows for sure how many such IoT devices are connected and communicating at any given time. Estimates by Cisco suggest that the total in 2015 may reach over 10 billion. By 2016 some estimates suggest that there may be more connected devices than there are people on Earth. Only a few high profile devices have any security at all.

While it’s likely to be nearly impossible to simply add security to existing sensors and controllers that make up this part of the IoT, perhaps it’s possible to begin with a more measured approach. Clearly some of those things are reporting on critical infrastructure and should be upgraded as quickly as possible.

Why not just hold the manufacturer liable in case of blatant security issues? For example, NAS drives with a default password backdoor (which are pretty common), or the use of known weak (or no) encryption.

Hackers could use baby monitors to watch your kids too

Found on CNet News on Thursday, 03 September 2015
Browse Technology

Experts said the flaws are one more example of the lack of security in the realm of gadgets that can communicate with the Internet, a trend known as the "Internet of Things." Whether it's a smart thermostat or a connected refrigerator, the devices are landing on store shelves without standardized security controls, potentially putting customers at risk, experts say.

Maybe the companies should be held responsible if it turns out that they have neglected basic security measures. With the IoT growing, these issues will get more and more common.

Connected home device security only gets worse

Found on CNet News on Tuesday, 11 August 2015
Browse Technology

IoT devices can make our daily lives more efficient, but manufacturers are yet to get up to speed when it comes to security -- and a constant stream of research concerning smart systems has revealed just how easy it can be to exploit vulnerabilities and manipulate these kinds of devices.

"The rapid growth of the Internet of Things now includes thousands of connected products, yet it's shocking how little planning there has been for these devices becoming part of everyday life," said Craig Spiezle, Executive Director and President of OTA.

The problem is that developing devices gets easier and easier. Simpler develboards and an increasing number of enthusiasts result in the creation of more IoT devices. For the majority, the focus is to get the device working only; when it comes to security, that focus starts to blur. This also points out how important it is to open-source the IoT devices: if the original developer drops the project, the community can still carry on and keep it updated.

Warning after security experts hack Tesla car

Found on BBC News on Thursday, 06 August 2015
Browse Technology

It is the second time in a month that a car maker has had to act to solve security problems with its vehicles uncovered by hackers.

In late July, Fiat Chrysler issued a recall for more than 1.4 million vehicles after hackers Charlie Miller and Chris Valasek showed how to use bugs in the onboard software of the Jeep Cherokee to shut it down remotely.

Considering that electronics are getting not only more important, but also turn cars into computers, hacks will become more common. While you might not like it if your PC at home annoys you with adware or sends out spam, your exploited car will be way more dangerous; to you and everybody else in your way.

The truth about Ultra HD 4K TV refresh rates

Found on CNet News on Sunday, 02 August 2015
Browse Technology

The fact is that nearly all of these new 4K TVs -- which now make up the increasing majority of all TVs priced over $1,000 -- have, at best, a 120 Hz refresh rate. Actually, many of the least-expensive are actually 60Hz, and none that we know about are 240 Hz.

There are two things at play here. The first is simple, and one we've said many times before: don't trust marketing. At least, don't trust it at face value. Marketing is designed to sell you a product, not give you information about a product. That's secondary.

Marketing means to paint over the ugly problems, and polish the good sides. Often that's supported by made-up numbers and claims. Yes, it is a lot like makeup.

We tear apart a $340 audiophile Ethernet cable and look inside

Found on Ars Technica on Thursday, 23 July 2015
Browse Technology

Potentially fantastical claims about audio clarity aside, the cable itself is of reasonably high quality, with braided and foil shielding around the entire cable coupled with foil shielding around the individual twisted pair bundles.

Of course, you can also use other shielded Cat7-equivalent Ethernet cables that cost one-tenth the Vodkas' price for the same purpose, so the fact that they're high quality cables doesn't really justify the price.

It's just an ethernet cable. For digital data. Meaning 0's and 1's only, nothing between. Even the best audiophile could not hear a flipped bit, but a computer could tell. So you can be pretty sure that the cables you can buy for a tiny fraction of that price do the same job just perfectly fine. There will still be people who claim that this cable makes everything better. If you think so, buy it along with a bottle of snakeoil.

Hackers Remotely Kill a Jeep on the Highway—With Me in It

Found on Wired on Wednesday, 22 July 2015
Browse Technology

Though I hadn’t touched the dashboard, the vents in the Jeep Cherokee started blasting cold air at the maximum setting, chilling the sweat on my back through the in-seat climate control system. Next the radio switched to the local hip hop station and began blaring Skee-lo at full volume.

Their code is an automaker’s nightmare: software that lets hackers send commands through the Jeep’s entertainment system to its dashboard functions, steering, brakes, and transmission, all from a laptop that may be across the country.

Thanks to one vulnerable element, which Miller and Valasek won’t identify until their Black Hat talk, Uconnect’s cellular connection also lets anyone who knows the car’s IP address gain access from anywhere in the country. “From an attacker’s perspective, it’s a super nice vulnerability,” Miller says.

Security should be important, and that not just mean brakes and airbags. With that ridiculous need to connect everything to the Internet, they open up an entire new can of worms. They might have control over the hardware development of the car, but when you import a piece of not audited software, your customers pay the price. Imagine someone figures out a similar exploit, sends it out via zombies and suddenly cars all over the world cause accidents.

1980s computer controls GRPS heat and AC

Found on WoodTV on Saturday, 13 June 2015
Browse Technology

The Commodore Amiga was new to GRPS in the early 1980s and it has been working tirelessly ever since. GRPS Maintenance Supervisor Tim Hopkins said that the computer was purchased with money from an energy bond in the 1980s.

A new, more current system would cost between $1.5 and 2 million. If voters pass a $175 million bond proposal in November, the computer is on the list of things to be replaced.

Just keep it running and collect some spare parts just in case. If Commodore wouldn't have messed up big time, the Amiga would be standard today.

Batteriser is a $2.50 gadget that extends disposable battery life by 800 percent

Found on PC World on Thursday, 04 June 2015
Browse Technology

Once the battery manufacturers grasp what Batteriser can do—assuming it works as advertised—they might be worried by this simple gadget, which will cost just $10 for a pack of four when it goes on sale in September.

Instead of using just 20 percent of all the power hidden inside of your Duracells and Energizers, Batteriser makes effective use of the remaining 80 percent.

So basically a Joule Thief with a small form factor. While it is great to see that someone creates a useable small gadget like this, it also makes you wonder why manufacturers of remote controls, wireless keyboards, mice and everything else that lives on alkalines don't use this dead simple circuit in their devices.

Memory alloy bounces back into shape 10 million times

Found on BBC News on Saturday, 30 May 2015
Browse Technology

The new material - made from nickel, titanium and copper - shatters previous records and is so resilient it could be useful in artificial heart valves, aircraft components or a new generation of solid-state refrigerators.

The key to its remarkable properties is the way it is crystallised. The nickel, titanium and copper atoms are arranged in such a way that they can switch between two different configurations - again and again and again.

Memory alloys are pretty impressive.