Hacked Doorbells Open The Gate for Thieves and Criminals

“IoT doorbell gave up Wi-Fi passwords to anybody with a screwdriver” read the headline from the January 27, 2016 posting on Naked Security by Sophos.  Many people will look at that and question the reliability of the article, wondering how it’s possible that something as simple as a doorbell could lead to such an invasion of privacy.  There’s an assumption of safety that comes with technological devices that creates a sense of false security for most consumers. 

Consumer Electronics Show – the largest collection of insecure devices in the world

The annual Consumer Electronics Show in Las Vegas has just wrapped up.  With 160,000 attendees, 3,800 exhibitors and almost 2.5 million square feet of exhibit space, this is the largest electronics show in the world.  The array of new products and technologies has been featured on virtually every media outlet from Good Morning America to Conan. 

Roll your own vs. commercial, the great RTOS Security Framework Debate?

Security solutions for embedded devices are where RTOSes were in the 1980s.  A few commercial solutions have started to appear on the market and customers are left with the choice of rolling their own solution or adopting a commercial solution. 

Early on, many companies rolled their own RTOS.  Over time, this gradually changed with commercial RTOSes becoming a larger and larger percentage of the market.  Eventually, quality open-source solutions became available, providing yet another option for developers.

Security for the Smart Home – Who is Responsible?

As smart home technology moves from the lab to the marketplace, many home security, surveillance and control functions will now be exposed to the Internet through Smart Home gateways and management systems.  Are these systems ready for the cyber-attacks that will undoubtedly ensue?  And who is responsible for ensuring these devices are safe from attack?

The security challenge for the smart home, with its network of specialized, connected devices is different than the security challenges for enterprise networks and PC systems.

Security Requirements for Embedded Devices – What is Really Needed?

Recently there have been a number of well documented attacks on embedded devices ranging from hacked vehicle anti-theft and control systems to hijacked printers that sent copies of documents to the hacker’s computer.  Many embedded devices include password protected logins and encrypted protocols such as SSH or SSL, but this is not sufficient.  If these methods were enough, we would not be reading about security breaches in the media.