Although there’s little press these days, Privacy and Security should be at the top of your list when prioritizing your IoT Project needs.
Why, you ask? Would you leave an unlocked car on the street? Would you use a debit card without a chip or pin?
The answer is simple. You wouldn’t.
7 Things to Consider When Planning Your IoT Project
Thanks to and your friends at SafeJunction
“Keep your home and loved ones safe with these time-tested home security tips.
- Survey your home, thinking like a would-be burglar.
- Have a look at the locks on your doors, the length of the screws used to secure the hinges, and the screws used in the striker plates that the deadbolts rest in.
- Securing the door frames themselves makes good sense.
- Consider the landscape around your home.
- Doors and locks themselves should be of the highest quality.
- Consider the space in-between the door and its frame.
- Windows can be secured in a number of ways.
- Use multiple locks on doors.
- Consider installing exterior lighting in key areas to light the most vulnerable doors and windrows.
- Identify things in your yard that could be of use to a burglar.
- Hide your valuables from plain view.
- Consider investing in protective window film or window bars if you live in a high risk area.
- Do not leave mail in the mailbox for any length of time, or leave flyers or advertising paraphernalia in the door.
- Use timers for lights inside your home, if you go away regularly from your home at night.
- For the same reasons that one shouldn’t leave mail and adverts in the door or mailbox, one also should take care not to leave any outside lights burning all night into the day.
- If you live in a neighborhood that has been plagues with home invasions, it is a good idea to create a safe room inside your home for you and your family.
- Engrave your valuables with an engraving tool, putting your name on them.
- Don’t stash all of your valuables in one place.
- This goes with tip # 17: photocopy all the contents of your purse or wallet.
- Join or start a neighborhood watch program, if this is possible.
- If you go out,whether to work or just about town, consider leaving the radio or television on, and preferably on a talk program. this, with the other tip of leaving lights on timers, can go a long way to confusing a would-be burglar.
- If you like animals, and don’t have any sorts of allergies or similar issues, consider getting a dog.
- Most garages have doors leading to the house from the inside of the garage, and most often these are the least protected entrances. Give these doors the same consideration as you would your front or back doors!
- This last one is so obvious, but you would be surprised how many of my neighbors do it: do not leave home with the windows open!”
Source: 24 Home Security Tips for 2017 | Live Safely
Thanks to Live Safely
For anyone who’s snagged a ride with Uber, Ward Spangenberg has a warning: Your personal information is not safe.Internal Uber employees helped ex-boyfriends stalk their ex-girlfriends and searched for the trip information of celebrities such as Beyoncé, the company’s former forensic investigator said.“Uber’s lack of security regarding its customer data was resulting in Uber employees being able to track high profile politicians, celebrities, and even personal acquaintances of Uber employees, including ex-boyfriends/girlfriends, and ex-spouses,” Spangenberg wrote in a court declaration, signed in October under penalty of perjury.
One would think that the passenger would have some expectation of privacy, but in the case of Uber technology, the personal information connected to the passenger is part and parcel of their service model. So how can the company protect its riders from the questionable activities of their employees who have access to rider data?
Source: Uber said it protects you from spying. Security sources say otherwise | Reveal
Thanks to Reveal
Google today announced Android Things, its new comprehensive IoT platform for building smart devices on top of Android APIs and Google’s own services.
Watch for a variety of tool-kits that will simplify the inter-operability AND security between IoT devices the methods we use to talk to them: Smartphones, tablets, and traditional desktops and laptops.
Source: Google launches first developer preview of Android Things, its new IoT platform
Thanks to TechCrunch
Transform your engineering processes and tools to gain a competitive advantage from the Internet of Things
IoT design will ultimately improve simplicity, functionality, and (Yes, Virginia) security!
Source: The impact of the Internet of Things on product development – Embedded Computing Design
Thanks to IoT Design
Recent attacks on the internet could be a prelude to far worse ones…
…To fix the problem properly, Mr Krebs argued in a blog post, the makers of such devices, collectively called the “internet of things” (IoT), would all have to recall vulnerable systems and change their careless approach to security. Since this is unlikely to happen, regulators may have to step in.
San Diego startup SafeJunction has developed a technology that privatizes the data leaving IoT devices and sets the conditions under which it can be used in the wild. Their patented SafeShare approach will eliminate most of the problems that have surfaced recently with Denial of Service (DOS) attacks on vulnerable web services targets.
IoT product and mobile device developers can contact SafeJunction at firstname.lastname@example.org for information.
Source: Crash testing
Thanks to Esquire
Dyn, the victim of last week’s denial of service attack, said it was orchestrated using a weapon called the Mirai botnet as the ‘primary source of malicious attack’
The most interesting feature of the attack is that it involved the use of IoT devices, things like cameras and other devices that use “ethernet protocols” to send or receive data to other connected devices. These “Internet of Things” devices exist all over the world and outnumber computers and smartphones by more than 100-1. That number is growing exponentially these days. Protecting them from such criminal abuse is a huge challenge for security experts.
Look to companies like SafeJunction to provide privacy and security solutions that will protect IoT devices as well as the computers and smartphones that they are designed to communicate with.
Source: DDoS attack that disrupted internet was largest of its kind in history, experts say
Apple makes a bizarre choice in choosing a weaker password protection mechanism for iOS 10 backups.
Source: iPhone Hackers Say Apple Weakened Backup Security With iOS 10
Thanks to Forbes
Key escrow – the process of keeping a set of keys for yourself “just in case” – has always been the US government’s modus operandi when it comes to security.
The TechCrunch article is a must read – for a number of reasons, not the least which are the conclusions. In my “guarded” opinion not having locks at all is ludicrous. In this case, I was tempted to offer no opinion at all (since it might be useless), but I am reducing risk (slightly) by taking issue with the premise and the conclusion. The facts speak for themselves, yet another thread might be No Passwords At All because they might be cracked or Don’t Lock Your Car because criminals know how to break in. Aren’t we forgetting the deterrent or delaying possibilities?
Also, I seriously doubt that the author ever managed a company security office. If he did, I want to know his secret.
Source: Security experts have cloned all seven TSA master keys | TechCrunch
Thanks to TechCrunch
All Symantec and Norton anti-virus software has security flaws that can be exploited with results that can be devastating. If you are using these products you should make sure your software is updated immediately.
Source: If You Are Using Security Software From Symantec Or Norton You Should Upgrade Immediately – Forbes
Thanks to Forbes