29 Jul '16, 10pm

3 #IoT #Security Lessons from #Jeep #Hackers

Last year, hackers demonstrated to us how the IoT, when unsecured, can be used to hack a Jeep remotely while it’s in the middle of a highway . A scary scenario. It served as a wake-up call for many in the automotive industry, especially those at Jeep who promptly issued a patch for the vulnerability. Since then, the company behind the Jeep hack, IOActive, has come out with a survey claiming that nine out of every 10 IoT devices on the market today have not been designed with adequate security. These figures are concerning and should serve as a reminder to everyone how we must strengthen our commitment to IoT security. Below, we list out the three key lessons we must learn about IoT security practice and policy. 1. Security must be the number one priority for IoT. The potential of the IoT is seemingly unlimited – new innovations are being made every day. This is brilliant f...

Full article: https://www.wirelessdesignmag.com/blog/2016/07/three-iot-...

Tweets

Maxis wants to make businesses smarter with IoT

Maxis wants to make businesses smarter with IoT

soyacincau.com 29 Jul '16, 12pm

Maxis wants to make businesses smarter with IoT Posted: July 29, 2016 By: Alexander Wong No comments Internet connectivity...

Recommended essay: The future of #IoT security. #electronics #RaspberryPi

Recommended essay: The future of #IoT security....

circuitcellar.com 06 Aug '16, 5pm

Consider data encryption for network transfers as an example of why existing security mechanisms generally do not work wel...

Building the IoT – Connectivity and Security -

edn.com 25 Jul '16, 11am

In my prior blog, Building the IoT: standards and hardware needs , I discussed how the "things," device hardware and their...

is available for purchase

is available for purchase

sedo.com 04 Aug '16, 10am

Global Market Leader As a neutral marketplace, we provide services for anything and everything to do with domains: With 2 ...

IoT monitor by ajtalsma

freelancer.com 01 Aug '16, 4pm

xml requirements repository freeware , simple server monitor script , getafreelancercom bookstore project website requirem...

Cybersecurity Startup: If the DNC Had Our Security Tech, It Could Have Bricked Those Files

Cybersecurity Startup: If the DNC Had Our Secur...

spectrum.ieee.org 29 Jul '16, 2pm

I generally cover consumer technology, not enterprise. And particularly not enterprise IT security, which can be extremely...

ARM expands IoT security team in Israel - Desig...

design-reuse.com 01 Aug '16, 11am

"The technologies we are developing in Israel will have a significant influence on advanced system-on-chip IP for IoT and ...

20 Years of running, 20 valuable lessons learned

runnersworld.com 02 Aug '16, 5am

In 1995, entering the New York City Marathon cost $30. O.J. was acquitted. The world marveled over a shiny new storage for...

IoT take up increases, but security concerns linger

IoT take up increases, but security concerns li...

newelectronics.co.uk 25 Jul '16, 8am

Erik Brenneis, pictured, director, IoT, for Vodafone, said: “What matters now is not whether a business should adopt IoT, ...

GI lessons learnt from London 2012

GI lessons learnt from London 2012

ukgbc.org 02 Aug '16, 9am

So the key lesson I took away from the Olympics is that GI is an essential element to the success of large scale infrastru...

Design for Hackers

Design for Hackers

hackaday.com 27 Jul '16, 2pm

Near the end of the lifecycle of mass-market commercial product development, an engineering team may come in and make a de...

First end-to-end security solution for #IoT dev...

microchip.com 11 Aug '16, 1pm

An extensive Clock and Timing portfolio that delivers a one-stop shop for your complex timing requirements. Our Oscillator...

Meeting Cloud Challenges May Pave Way for IoT

ecnmag.com 28 Jul '16, 7pm

For someone who works in cloud computing, the Internet of Things (IoT) is a tantalizing prospect, looming on the horizon. ...

Launch party today in #Balham of 3 room #salsa ...

ht.ly 09 Aug '16, 5pm

@UKDancedotEvent created this 23 hours ago using Hootsuite

Even reputable companies can have IoT security flaws

Even reputable companies can have IoT security ...

electronicsweekly.com 27 Jul '16, 4pm

“Practical exploitation effects ranging from the accidental disclosure of sensitive network configuration information, to ...