IoT

6 open source home automation tools | Opensource.com

https://opensource.com/life/17/12/home-automation-tools?sc_cid=7016000000127ECAAY  The Internet of Things isn’t just a buzzword, it’s a reality that’s expanded rapidly since we last published a review article on home automation tools in 2016. In 2017, 26.5% of U.S. households already had some type of smart home technology in use; within five years that percentage is expected to double.  While connected devices often contain proprietary components, a

Getting Started with IoT Security with Threat Modeling

https://www.denimgroup.com/resources/blog/2017/11/getting-started-with-iot-security-with-threat-modeling/?lipi=urn%3Ali%3Apage%3Ad_flagship3_pulse_read%3BtGhVz%2BNYQRiSgJC%2Bt%2FEWQQ%3D%3D The security of IoT systems can be exceptionally complex because of the large number of components, potentially extensive attack surface, and the interactions between different parts of the system. Threat modeling is a great starting point to understand the risks associated with IoT systems. The challenge with this trend is that IoT devices are just computers

Arduino Blog » Linux support comes to Arduino Create

https://blog.arduino.cc/2017/11/03/linux-support-comes-to-arduino-create/ This looks interesting:  update to the Arduino Create web platform will enable development and deployment of IoT applications with integrated cloud services on Linux-based devices.  Users will be able to program their Linux boards as if they were regular Arduinos. Multiple Arduino programs can run simultaneously on a Linux board and programs can communicate

Industrial IoT Gateway Based on Android Things – Hackster.io

https://www.hackster.io/mhanuel/industrial-iot-gateway-based-on-android-things-c680d1 This project is a proof of concept of an Industrial Gateway based on Android Things.  Android Things allow to cut development time of the gateway by facilitating the integration with required interfaces such as Ethernet, UART, SPI and I2C. Android Things can be used in common SBC such as Raspberry Pi to have a quick

Report Scores Cities to See if Technology Makes Them Safer – IEEE Spectrum

https://spectrum.ieee.org/tech-talk/computing/networks/report-scores-cities-to-figure-out-if-investing-in-technology-makes-them-safer  More and more people are migrating to cities. By 2030, 60 percent of the world’s population will live in an urban setting, according to the United Nations. How can these growing cities reduce conflicts, crime, violence, and terrorism? In a word: technology. 

After quietly infecting a million devices, Reaper botnet set to be worse than Mirai | ZDNet

http://www.zdnet.com/article/reaper-botnet-could-be-worse-than-mirai-cyberattack/?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BMmD%2FR1DIQduoO1k8kb9JCA%3D%3D A little over a month ago, a sizable botnet of infected Internet of Things devices began appearing on the radar of security researchers. Now it’s on track to become one of the largest botnets recorded in recent years. The botnet, dubbed “Reaper” by researchers at Netlab 360, is said to have ensnared almost two million internet-connected webcams,

To Secure the Internet of Things, We Must Build It Out of “Patchable” Hardware – IEEE Spectrum

https://spectrum.ieee.org/telecom/security/to-secure-the-internet-of-things-we-must-build-it-out-of-patchable-hardware  For several years now, the number of things connected to the Internet—including phones, smart watches, fitness trackers, home thermostats, and various sensors—has exceeded the human population.   For the most part, this development promises great excitement and opportunity for engineers and society at large. But there is a dark cloud hanging over the IoT: the

Troy Hunt: What Would It Look Like If We Put Warnings on IoT Devices Like We Do Cigarette Packets?

https://www.troyhunt.com/what-would-it-look-like-if-we-put-warnings-on-iot-devices-like-we-do-cigarette-packets/  So how would warning labels on IoT devices that have had serious security vulnerabilities look?   Hilarious and also so needed. “Intrusions can occur anywhere”…  Or maybe it doesn’t need to be tech/legalspeak. WARNING! This connects to the INTERNET and BAD THINGS may happen!

Securing smart grid and advanced metering infrastructure

http://securityaffairs.co/wordpress/63902/security/securing-smart-grid.html  During the recent years, there have been two cyber-attacks on power plants in Ukraine, which for the first time in the history succeeded to disrupted and cut power in a country.  An analysis of the events in Ukraine indicates that in order for a cyber-attack to materialize, three conditions must exist: opportunity, ability, and motivation.