Security for Connected Devices

Security for Connected Devices

IoT typically represents a network of physical objects (or “things”) embedded with electronics, software, sensors, and connectivity to enable those objects to exchange data with the manufacturer, operator, cloud and/or other connected devices.

Apr 3, 2019
Your printer can be a dangerous, overlooked attack surface

Your printer can be a dangerous, overlooked attack surface

The end of 2018 saw a rash of cyberattacks mounted by way of networked printers. In one notable incident, as reported by Kaspersky, a hacker targeted 50,000 printers and caused them to print a message supporting a YouTuber named PewDiePie. According to Kaspersky, the hacker had utilized Shodan, a search engine for devices, and found no fewer than 800,000 vulnerable printers from which to choose. This story, and many others like it, should alarm anyone tasked with cyber security duties. The ubiquitous printer can be a dangerous, overlooked attack surface.

Mar 20, 2019
Circles and End Points, Mobile World Congress 2019

Circles and End Points, Mobile World Congress 2019

Anyone that follows the world through tradeshows for long enough knows they are cyclic. Whether that’s the rise and fall of events or the themes within events, patterns start to emerge.

Mobile World Congress is no different.

Smartphones may get faster, the stands may get bigger *; but recurrent themes start to emerge.

Mar 4, 2019
Are you playing Russian Roulette with your apps?

Are you playing Russian Roulette with your apps?

The growth in usage means that there is an increase in sensitive data being installed, stored and generated on mobile devices. That data is the users’ personal data – governed by privacy legalisation like GDPR; it is the Intellectual Property in the apps; and it is secrets like cryptographic keys that are used to secure both the data on the device and access to backend services.

Feb 22, 2019
Will an App Hack Cyber Attack Steal Your Car - Your Life?

Will an App Hack Cyber Attack Steal Your Car - Your Life?

Today’s cars have more in common with powerful computers than with their mechanical machine ancestors.

And as more and more cars become internet-connected, cybersecurity has become a pressing issue for the automotive industry.

Nov 28, 2018
Don’t forget about the user when adding security: A report from Money20/20 2018

Don’t forget about the user when adding security: A report from Money20/20 2018

Money20/20 is always a special event. Surrounded by the wonderful madness of Las Vegas, the great and the good of the financial world descend to discuss serious topics that will shape the industry in the years to come.

 

Identity was one of the early themes to merge from the show. Conference tracks on the Sunday were dedicated to the subject – with the always insightful Dave Birch reminding everyone not to digitise existing forms of identity but to create truly digital identity.

Oct 29, 2018