Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

OWASP Appsec Tel Aviv 2019, Aaron Guzman's 'Vehicle Security Trends & Implications For Automotive Suppliers' →

July 31, 2019 by Marc Handelman in OWASP Appsec Tel Aviv, OWASP, Information Security, Education, IoT Security, IoT, Cybersecurity, Conferences

Aaron Guzman is a Director with Aon’s Cyber Solutions Group, also serving as Head of Automotive & IoT Testing.

July 31, 2019 /Marc Handelman
OWASP Appsec Tel Aviv, OWASP, Information Security, Education, IoT Security, IoT, Cybersecurity, Conferences

OWASP Top Ten IoT 2018

January 29, 2019 by Marc Handelman in IoT Security, Information Security, OWASP
January 29, 2019 /Marc Handelman
IoT Security, Information Security, OWASP

Japan Government Set To Hack Citizen Owned IoT Devices

January 29, 2019 by Marc Handelman in Information Insecurity, IoT, IoT Security

In preparation for the country's 2020 Olympics (and - ostensibly - in order to avoid catastophic numbers of IoT vectored attacks during the Olympic events)... Probably about 5 years too late, though, as the enormity of fixing the problems may be insurmountable even for the Japanese Governmental Security Groups, who are well-known for attention to detail. Regardless there will certainly be an enormous number of surprises and what-not in their targeted bailiwick of connected devices. H/T

January 29, 2019 /Marc Handelman
Information Insecurity, IoT, IoT Security

Gerhard Jacob's 'Taking Stock: The Internet of Things and Machine Learning Algorithms at War'

September 18, 2018 by Marc Handelman in War, Defense, Information Security, Cybersecurity, IoT Security, State of Israel, United States of America

> Image Credit> , > Israeli Defense Forces> , The > IDF**> Desert Rreconnaissance Battalion**> Training Exercises

Terrific blog post by Gerhard Jacobs, writing at the Imperva Cybersecurity blog, and discussing IoT and ML with Gilad Yehudai (Gilad is a Security Research Engineer at Imperva), this time, where connected devices and machine learning interact in concert with and inform warfighting and warrior, and machine capabilities. Today's Must Read.

September 18, 2018 /Marc Handelman
War, Defense, Information Security, Cybersecurity, IoT Security, State of Israel, United States of America

Circle City Con 5.0 2018, Jessica Hyde's 'IoT 4n6: The Growing Impact of the Internet of Things on Digital Forensics' →

July 18, 2018 by Marc Handelman in Conferences, Education, Information Security, Hardware Security, IoT Security, Circle City Con
July 18, 2018 /Marc Handelman
Conferences, Education, Information Security, Hardware Security, IoT Security, Circle City Con

Image Courtesy of the United States Marine Corps

USMC Grounds COTS UAVs: Security Concerns →

June 20, 2018 by Marc Handelman in US DOD, USMC, UAV, COTS, IoT Security

via Gidget Fuentes - writing at the United States Naval Institute (USNI), of the United States Marine Corps decision to ground all COTS (Common Off The Shelf) UAVs (Unmanned Aerial Vehicles) from use by Marines. The decision was precipated by the security flaws in consumer-grade drone platforms.

June 20, 2018 /Marc Handelman
US DOD, USMC, UAV, COTS, IoT Security

The iOT Radio Attack Primer →

December 12, 2017 by Marc Handelman in Information Security, Electromagnetic Waves, Radio, iOS Data Leakage, IoT, IoT Security

Nitesh Malviya, writing at Infosec Institute performs knowledge transfer within the radio science arena, with an exemplary iOT - related radio primer. This is a first in a series regarding iOT radio vectored attack research. Enjoy.

December 12, 2017 /Marc Handelman
Information Security, Electromagnetic Waves, Radio, iOS Data Leakage, IoT, IoT Security

DerbyCon 2017, Amit Serper's 'Peekaboo I Own You' →

October 18, 2017 by Marc Handelman in Conferences, Education, Information Security, Cloud Security, IoT Security, DerbyCon
October 18, 2017 /Marc Handelman
Conferences, Education, Information Security, Cloud Security, IoT Security, DerbyCon

465,000 →

August 31, 2017 by Marc Handelman in IoT Security, Incompetence, Blatant Incompetence

465,000. The number of Abbott manufactured pacemakers that require software updates due to life-threatening vulnerabilities resident within installed software packages. Coupled with easy accessibility via the interwebs, another example of incompetent software engineering in the manufacturing process? No, just a jarring welcome to the Internet of Shite. The United States Food and Drug Administration's announcement ordering a recall and detailing the flaws came as no real surprise:

via the FDA Announcement: Abbott's (formerly St. Jude Medical's) implantable cardiac pacemakers, including cardiac resynchronization therapy pacemaker (CRT-P) devices, provide pacing for slow or irregular heart rhythms. These devices are implanted under the skin in the upper chest area and have connecting insulated wires called "leads" that go into the heart. A patient may need an implantable cardiac pacemaker if their heartbeat is too slow (bradycardia) or needs resynchronization to treat heart failure. The devices addressed in this communication are the following St. Jude Medical pacemaker and CRT-P devices:

  • Accent
  • Anthem
  • Accent MRI
  • Accent ST
  • Assurity
  • Allure
August 31, 2017 /Marc Handelman
IoT Security, Incompetence, Blatant Incompetence

BSides Cleveland 2017, Erik Daguerre's 'IoT Device Pentesting' →

July 17, 2017 by Marc Handelman in BSides, Conferences, IoT Security, IoT, Information Security, Penetration Testing
July 17, 2017 /Marc Handelman
BSides, Conferences, IoT Security, IoT, Information Security, Penetration Testing

CSIAC: Certified Security by Design for the Internet of Things →

July 01, 2017 by Marc Handelman in All is Information, Education, IoT Security, IoT
July 01, 2017 /Marc Handelman
All is Information, Education, IoT Security, IoT

Marine IoT, The Rolls Royce Concept: But, Where's The Security? →

May 15, 2017 by Marc Handelman in IoT, IoT Security, Physical Security, Information Security

While extraordinarily phenomenal - a conceptual marine-based IoT infrastructure via Rolls Royce - is superbly painted as the future portrait of intelligent shipping; but, there is a nagging question my fellow travelers: Where's the security? Hat Tip

May 15, 2017 /Marc Handelman
IoT, IoT Security, Physical Security, Information Security

IoT Security Fail, The Collaborative Fix →

May 02, 2017 by Marc Handelman in IoT, IoT Security, ISOC, Information Security, Network Security, Hardware Security

Andrei Robachevsky, a Technology Program Manager at The Internet Society (ISOC), writes of a contemplated security engineering initiative targeting security flaws in the Internet of Things environ. Today's Must Read.

"Unfortunately, as is often the case with fast-pace developments, security of IoT components and the system as a whole is lagging. Price and functionality features take higher priority. We need to make security and privacy the most important features. Never before has the virtual world penetrated so deep into our physical lives, and if the gap isn't shortened there is a high risk of long-term damage to user confidence in the IoT." - Andrei Robachevsky, Technology Program Manager at The Internet Society (ISOC)

May 02, 2017 /Marc Handelman
IoT, IoT Security, ISOC, Information Security, Network Security, Hardware Security

The IoT Chain →

April 26, 2017 by Marc Handelman in All is Information, Anti-Patterns, Computer Science, Information Security, IoT, IoT Security, Hardware Security

Meanwhile, in troubling IoT news, a paper (published by the IACR) entitled "IoT Goes Nuclear: Creating a ZigBee Chain Reaction" & authored by Eyal Ronen, Colin O’Flynn, Adi Shamir and Achi-Or Weingarten (a Weizmann MSc student); we find - perhaps - the ultimate ZigBee nightmare... Today's Must Read (and while your're at it, check out the video to round out your day). Thanks and Tip O' The Hat

April 26, 2017 /Marc Handelman
All is Information, Anti-Patterns, Computer Science, Information Security, IoT, IoT Security, Hardware Security

RSA 2017, Cyber/Physical Security and the IoT: National Security Considerations →

April 13, 2017 by Marc Handelman in All is Information, Conferences, Information Security, IoT Security, National Security
April 13, 2017 /Marc Handelman
All is Information, Conferences, Information Security, IoT Security, National Security

33c3, Ray's 'Lockpicking in the IoT' →

January 24, 2017 by Marc Handelman in All is Information, Conferences, Physical Security, Lock Picking, IoT Security, IoT
January 24, 2017 /Marc Handelman
All is Information, Conferences, Physical Security, Lock Picking, IoT Security, IoT

Retailers Begin Physical Customer Tracking →

January 18, 2017 by Marc Handelman in All is Information, Tracking, Dubious Methodology, Questionable Tracking, User Tracking, Surveillance, Must Read, Demise of Privacy, Information Security, Information Sharing, Intelligence Sharing, Intelligence, IoT, IoT Security

Tracking, that is, with the assistance of Intel Corporation (NASDAQ: INTC), that benevolent arbiter of all things computational... El Reg has conveniently provided a FAQ (direct from the chip fabricator) in their superlatively reported post. Today's Must Read.

January 18, 2017 /Marc Handelman
All is Information, Tracking, Dubious Methodology, Questionable Tracking, User Tracking, Surveillance, Must Read, Demise of Privacy, Information Security, Information Sharing, Intelligence Sharing, Intelligence, IoT, IoT Security

The Toaster Conundrum →

January 10, 2017 by Marc Handelman in All is Information, Information Security, IoT Security

or 'No Need to Worry, Nothing to See Here, Move Along' view of IoT DDoS attacks in serverless modalities.

January 10, 2017 /Marc Handelman
All is Information, Information Security, IoT Security

FTC IoT, The Contest →

January 05, 2017 by Marc Handelman in All is Information, USFTC, IoT, IoT Security, Information Security

The FTC is now running contests... What's next - Casual Friday?

January 05, 2017 /Marc Handelman
All is Information, USFTC, IoT, IoT Security, Information Security

Deutsche Telekom, Drone Hunter →

December 08, 2016 by Marc Handelman in All is Information, IoT, IoT Security, Drones, Information Technology, Information Security

Apparently, Deutsche Telekom is now in the anti-drone business, utilizing a partner toolkit - monikered 'DroneTracker', and branded - interestingly - the 'Magenta Drone Protection Shield'...

'DroneTracker, developed by Dedrone in Kassel, is the key system that detects drones automatically by means of various sensors – such as video cameras, radio frequency scanners, and microphones – and repels them if necessary. At its core is smart software that is able to distinguish drones from birds, helicopters, and other flying objects safely, and even to recognize specific drone models.' - via HelpNet Security

December 08, 2016 /Marc Handelman
All is Information, IoT, IoT Security, Drones, Information Technology, Information Security
  • Newer
  • Older