What I’m mentioning a lot these days (and hearing about it as well) is the chaotic propagation and growth of the Internet of Things. With billions of devices slated to connect to the internet every year, we’re going to be facing some serious challenges. I’ve already discussed how blockchain technology might address connectivity issues for huge IoT ecosystems.
But connectivity accounts for a small part of the problems we’ll be facing. Another challenge will be processing and making sense of the huge reams of data that IoT devices are generating. Close on its heels will be the issue of latency or how fast an IoT system can react to events. And as always, security and privacy issues will remain one of the top items in the IoT challenge list. Continue reading
The complexity of the cybersecurity landscape is simultaneously increasing in different directions. On the one hand, the volume and sensitivity of data being stored and used by firms is growing, which means IT security experts have their hands full of information that needs to be secured. Meanwhile, hackers are constantly attacking organizations in new, inconceivable ways, making traditional security tools less and less effective. Continue reading
A recent DDoS attack staged against a brick-and-mortar jewelry store highlights just how devastating the negligence of IoT security can become. The attack, as reported by SC Magazine, involved a 35,000 HTTP request per second flood carried out by an IoT botnet of more than 25,000 compromised CCTV cameras scattered across the entire globe, causing the shop’s servers to go down. Continue reading
By the end of this year, there will be more than 4 billion connected devices in use by consumers, according to Gartner. These IoT devices, which include smart TVs, tablets, smartphones, notebooks, wearables, sensors, Nest thermostats and whatnot, will make our lives more efficient, more energy saving, more comfortable, and less costly.
But the same technology that is making yesterday’s sci-fi today’s reality is also making us more vulnerable to attacks, and is opening up new possibilities for malicious actors to target us while we’re within the comfortable confines of our homes. Continue reading
Websites are without a doubt a very – if not the most – attractive target for hackers. And when it comes to attack vectors, there’s no shortage of vulnerabilities in websites for malicious hackers to exploit.
Very recently, the Qatar National Bank fell victim to a data breach that exposed 1.4 gigabytes of sensitive customer information including personal data and credit card information. The bank itself suspects a SQL Injection vulnerability to be responsible for the success of the attack. And The QNB is not the only firm to fall victim to website hacks in the past months. Continue reading