“USB sticks containing harmful malware have been left in Australian letterboxes, police in Victoria have warned.
…The devices are “extremely harmful” and should not be used, police say.
It is not uncommon for USB sticks to be used to carry and transmit destructive malware and viruses to computers.
Cybersecurity experts have called the technology “critically flawed“, and in 2014 demonstrated to the BBC how any USB device could be used to infect a computer without the user’s knowledge.”
Read more: http://www.bbc.co.uk/news/technology-37431335
Gigavation thought leadership on cyber security panel at flagship Detroit Automotive Conference
“From sensors to computers to communications networks, the technology in automobiles today exposes them to an alarming array of potential cyberattacks.”
“By exploiting weaknesses in wireless communications systems or in devices that connect directly to cars (such as smartphones, insurance dongles, or diagnostic tools), hackers could conceivably gain access to data stored on a vehicle that describes its owner’s driving habits, current location, entertainment preferences, or daily schedule.”
“Newer connected vehicles represent an emerging target for hackers because these vehicles are essentially rolling ecosystems of unsecured technologies.”
Read more: http://deloitte.wsj.com/cio/2016/04/18/caution-cyber-risks-ahead-for-connected-cars/
“The scope, frequency and severity of hacks have increased with every passing year. One of the driving factors behind this, say security experts is a new corporatization and professionalism of hackers. …
‘The stealing of corporate meetings and notes to get a competitive advantage is ridiculously real,’ Barone added, ‘They’re stealing blueprints, because they want to see where this company is going to build next and what their security infrastructure looks like behind it.
Law firms, designers, factories, anyone who can have potentially valuable information can be a target.”
Read more: http://www.thestreet.com/story/13446854/1/industrial-hacking-how-cyber-crime-went-pro.html
“Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams.”
“The cameras are vulnerable because they use the Real Time Streaming Protocol (RTSP, port 554) to share video but have no password authentication in place.”
“The consumers are saying ‘we’re not supposed to know anything about this stuff [cybersecurity],” he said. “The vendors don’t want to lift a finger to help users because it costs them money.”
“The bigger picture here is not just personal privacy, but the security of IoT devices,” security researcher Scott Erven told Ars Technica UK. “As we expand that connectivity, when we get into systems that affect public safety and human life—medical devices, the automotive space, critical infrastructure—the consequences of failure are higher than something as shocking as a Shodan webcam peering into the baby’s crib.”
Read More: http://arstechnica.com/security/2016/01/how-to-search-the-internet-of-things-for-photos-of-sleeping-babies/?utm_source=twitterfeed&utm_medium=linkedin
“A security bug discovered by Princeton researchers leaked the location information of Nest Thermostat owners over the Internet.”
“This is not the first security vulnerability from Google’s sister company, Nest, and its first child, the Nest Learning Thermostat. Last year we reported on a 15-second USB hack that would give hackers full remote controls and access to information on the daily whereabouts of owners.”
“Even with these findings Grover considered Nest’s Thermostat to be “one of the more secure devices” in his test. It is not the sort of title that would instill confidence in the security of our future technology.”
Read More: http://www.msn.com/en-us/news/technology/security-flaw-compromises-location-of-nest-thermostat-owners/ar-BBoyymM
Gigavation leadership: Keynote Speaker on the Cybersecurity panel at the Automotive USA 2015 Conference alongside OEMs and other telematics experts.
Atlanta, November 16-17, 2015
“‘Cybersecurity is an absolute top priority for automakers,’ said Wade Newton, a spokesman for the Alliance of Automobile Manufacturers, a trade group representing the world’s largest car makers.”
“‘The CAN bus is hopelessly insecure,’ Fisher said. It was developed decades before cars were connected to the Internet and lacks features to block malware programs or reject commands from unauthorized intruders.”
“The low-cost chips used in many Internet of Things devices lack built-in security features…”
“…Sadowski said he believes that Internet of Things developers would benefit from the same kind of crisis mentality. ‘I think we do need a rallying cry like that,’ he said. ‘Many of the developers are probably thinking features first, security second. . . . What we really need to do is educate the developers and the users as to the potential risks.'”
Read more: http://www.betaboston.com/news/2015/08/03/after-car-hack-internet-of-things-looks-riskier/
“Drivers shouldn’t have to choose between being connected and being protected.”
“‘This might be the kind of software bug most likely to kill someone.’ In fact, Miller and Valasek aren’t the first to hack a car over the Internet. In 2011 a team of researchers from the University of Washington and the University of California at San Diego showed that they could wirelessly disable the locks and brakes on a sedan. But those academics took a more discreet approach, keeping the identity of the hacked car secret and sharing the details of the exploit only with carmakers.”
Read more: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
“Cybersecurity innovation is a recognized goal across industry, and in society, due to the increasing threat of cyber espionage and crime as well as the importance of maintaining simple user interfaces. MIT Startup Exchange (STEX) is convening a workshop to discuss the latest advances in cybersecurity from the perspective of corporates, academics, VCs, and startups in the MIT ecosystem redefining the field today.”
Read more: http://startupexchange.mit.edu/startupexchange/html/index.html#viewOpportunity/63