Skip to content

Category: Cybersecurity

Top 5 Security Risks for Connected Cars

The global market for connected cars will grow by 270% by 2022 with 125 million passenger cars expected to ship worldwide between 2018 and 2022.1 By 2020, it’s estimated that UK, France and Germany will reach 100% connected car penetration. Growth in the European region is due to the eCall mandate which requires new cars to automatically dial the 112 emergency number in the event of a serious accident.2 While North America and Europe lead in the highest percentage of shipments, China accounts for 32% of shipments. The list of connected features enjoyed by consumers that add more opportunities for security attacks…

Who is Responsible for the Data Security of 50 Billion IoT Connections?

This article originally appeared on IAPP.org, the International Association of Privacy Professionals. “No matter what happens, don’t panic,” were the words used by hackers just before they hacked a 2014 Jeep Cherokee. It wasn’t your typical hack, where credit card information is stolen, or a denial of service attack is propagated, or a website is taken down. This incident involved disabling the transmission and brakes of a vehicle driving 70 mph. In other words, this is the kind of hack that could take someone’s life. Car hacks make juicy headlines, but dating back as far as 2007, we saw researchers demonstrate…

Drones Over Hollywood: An Aerial View of Video Security

This post originally appeared in Exchange Wire. As NAB comes to a close for another year, aerial robotics and drones are once again a popular topic of conversation. The uptake of drone usage in content production is soaring; but it seems that even drones are susceptible to malware and bot attacks. ExchangeWire speaks with Beth Kindig (pictured below), product evangelist, Intertrust, about how the popularity of drones needs to make way for effective security measures. What do the Matt Damon film ‘The Great Wall’, Mary J. Blige’s newest music video, and ‘Fast and Furious 6’, all have in common? Each contain…

5 Ways Hackers Attack Mobile Devices and Applications

Hackers go about achieving their goals with reverse engineering software to find vulnerabilities they can exploit, data they can extract, or ways to modify the software to do something it was never intended to do. The primary consequences of applications getting hacked include financial loss, destroyed brand reputation, exposure to liability, and regulatory risk. Over 7 billion identities have been stolen in data breaches over the last eight years equal to one data breach for every person on the planet.   Why do Hackers Attack Mobile Devices and Applications? In order to understand threats, we must understand what hackers are trying…

How Driverless Cars will put Mobile Security to the Test?

As GM CEO Mary Barra said in a keynote speech, “A cyber incident is a problem for every automaker in the world. It is a matter of public safety.” As Tesla, GM and many others continue to release connected vehicles – and soon driverless vehicles, the dangers are set to increase. In fact, more than half of the vehicles sold today are connected and vulnerable. By 2025, the driverless market will be worth $42 billion up from nearly nothing with an official market entry still being anticipated [1]. Self-driving cars have the potential to save 292,000 lives annually from preventing collisions.…

Are FinTech Solutions Safe on Mobile?

We live in a digital world where almost everything we touch is being stored on servers, the cloud or in mobile applications. Technologists push for the adoption of digital services and applications while consumers push back for safety and fraud protection. Fintech solutions on mobile are in a predicament; on one-hand these solutions offer the premium convenience of making deposits and transfers on-the-go, and the on the other hand, it digitizes and potentially sells off a person’s most valuable possession: their wallet. Banks and financial institutions have quite a bit to gain – especially on a global level. Although still…

Should We Build a Backdoor into Mobile Devices?

Two years ago the San Bernardino shooting stirred a debate within the security community regarding warrant-proof encryption. The debate, known as “mobile backdoor access,” refers to exceptional access to encrypted communications and data by law officials. In theory, the Department of Justice wants technologists to “hide a key under the door mat” for law officials to access when they have the proper warrants. However, many security professionals and technologists have resisted this request due to creating weaknesses that are irreversible and require falsified automatic updates which may introduce other vulnerabilities. Perhaps the biggest conflict for technologists, as pointed out by…

IoT Medical Devices: Our Scariest Security Threat Yet

IoT medical devices may be our scariest security threat yet. Implanted devices such as pacemakers draw big headlines for security threats. However, there are 36,000 other health-care related devices in the United States that are discoverable on the connected device search engine Shodan – which doesn’t even take into account the global level of unprotected devices (source: Wired). In fact, U.S. hospitals have an average of ten to 15 connected IoT medical devices per bed with some hospitals registering 5,000 beds (or 50,000 connected devices). Therefore, the magnitude of the risks associated with these medical IoT devices is a gripping…

Cybersecurity in Connected Vehicles Becomes Safety Feature for New Cars

New car firms such as Tesla are promoting increasingly high-tech features that require a connection to the internet, which has propelled cybersecurity in connected vehicles forward as a major safety feature. Last year, Chinese security researchers from Keen Security Lab successfully managed to hack a Tesla Model S from 12 miles away. By focusing on Tesla’s on-board software, the hack targeted the car’s controller area network, or CAN bus, which connects the chips found inside the cars. In this hack, the Model S P85 and Model 75D were targeted. Tesla continued to make news in 2015 for safety concerns in…

We've Moved to IO-Fund.com

X