Security

Invasion of the Hardware Snatchers: Cloned Electronics Pollute the Market – IEEE Spectrum

http://spectrum.ieee.org/computing/hardware/invasion-of-the-hardware-snatchers-cloned-electronics-pollute-the-market Unlike counterfeit electronics of the past, modern clones are very sophisticated.  The counterfeiters make their own components, boards, and systems from scratch and then package them into superficially similar products. The clones may be less reliable than the genuine product, having never undergone rigorous testing. But they may also host unwanted or even malicious software, firmware,

New password guidelines say everything we thought about passwords is wrong

https://venturebeat.com/2017/04/18/new-password-guidelines-say-everything-we-thought-about-passwords-is-wrong/ There is a draft of new guidelines for password management from NIST (the National Institute of Standards and Technology). There is a number of very progressive changes they proposed. Although NIST’s rules are not mandatory for nongovernmental organizations, they usually have a huge influence as many corporate security professionals.

7 considerations to make when securing your Raspberry Pi

https://opensource.com/article/17/3/iot-security-raspberry-pi?sc_cid=7016000000127ECAAY  This article tries to get you thinking of security at an appropriate level for your Raspberry Pi and IoT projects without scaring you away from playing, experimenting, and innovating. It’s about striking a balance. Don’t let a challenge stop you from trying. Just be aware of the big picture for securing your projects.

OWASP Proposes New Vulnerabilities for 2017 Top 10

http://www.securityweek.com/owasp-proposes-new-vulnerabilities-2017-top-10?utm_content=buffer1a6b0&utm_medium=social&utm_source=linkedin.com&utm_campaign=buffer The Open Web Application Security Project (OWASP) announced on Monday the first release candidate for the 2017 OWASP Top 10, which proposes two new vulnerability categories.

Encryption and Securing Our Digital Economy

http://www.circleid.com/posts/20170407_encryption_and_securing_our_digital_economy/ Currently, there are 360 million people that take part in cross-border e-commerce. 28% of output in mature economies is digital. The Internet is set to contribute $6.6 trillion a year, or 7.1% of the total GDP in the G20 countries.  And, by 2020, it’s estimated that more than 1 billion users will be added and there will be 30-50

Can you trust Linux-based Tizen OS?

http://www.infoworld.com/article/3187840/linux/can-you-trust-linux-based-tizen-os.html Yesterday there was a story about millions of Samsung IoT that are vulnerable to attacks due to zero-day security holes. “I have been extremely critical of IoT vendors ignoring the importance of updates and security, putting millions of users at risk. In the case of Samsung, what bothered me the most was that these devices

Realizing the IoT’s security imperative | EDN

http://www.edn.com/electronics-blogs/eye-on-iot-/4458251/Realizing-the-IoT-s-security-imperative?_mc=sm_edn&hootPostID=cb43e5eb7c5182a4a36fafd4f0ad4a3d It’s true that in the animal kingdom there is safety in numbers. But in the Internet of Things (IoT), where billions of devices are expected to be connected within the next decade, the sheer volume of devices isn’t expected to mitigate the security risk. In fact, given that many devices may share the same