Yes, this is going to be another rant about the state of insecurity in the Internet of Things industry. But a good one.
Every once in awhile, I hear someone explain this most critical issue, which has been at the heart of so many security incidents in the past year, in a new, inspiring way. And I feel compelled to unpack and explain it for those who might have missed the important parts.
I had one of those moments of epiphany in this year’s TNW Conference, when Mikko Hypponen, the acclaimed cybersecurity expert from Finnish vendor F-Secure, delivered a speech titled “The Internet of Insecure Things.”
In the speech, Hypponen brushed upon some very interesting topics, including ransomware and IoT security. But there’s only so much you can pack into a 20-minute speech. Here are the key takeaways about IoT security. Continue reading
By T Roy, IoT Defense Inc.
One of the most common questions we get from potential customers, at least from the more technically minded ones is – I don’t have any open ports on my home router, do I still need the protection offered by a smart firewall? This question is based on the assumption that if a home Wi-Fi router does not have any open ports, no unsolicited traffic from the internet can access the router and hence it cannot be compromised by malicious actors on the internet.
In this article, we will describe some of the functionality provided by home routers, understand the security implications of such functionality, provide some context around the above assumption and arrive at some interesting conclusions. Continue reading
Businesses rarely encrypt their email messages because good encryption is too hard to use. That’s changing.
By Randy Battat, PreVeil
Most business-to-business communication involves sensitive information – stuff that the parties really don’t want others to know about. Whether it’s contracts, customer communications, supplier information, dialog with consultants and contractors, or other things, there’s a lot of sensitive information that travels via plain old email.
These emails really should be protected, i.e. encrypted. But the vast majority of B2B communication remains unencrypted, despite wide availability of very good technology and tools. Why? Continue reading
As internet privacy continues to unravel, it is becoming more and more evident that you’re on your own to protect your data against the many parties that are looking to hoard it. Perhaps one of the most pervasive collectors of data are Internet Service Providers (ISPs), the same companies that connect you to the internet.
ISPs have a huge stake in collecting data, mostly in selling it to advertisers to serve more targeted ads. And they’re in the best position to do so with wild abandon, without fear of retribution.
But a lot more than your preferences can be inferred from your internet traffic, including your health conditions and political orientation among others. Continue reading
One of the most basic practices every cybersecurity guide will recommend is not to click on links and attachments contained in emails coming from unknown sources, and to think twice even if they come from seemingly trustworthy sources.
You think it’s unnecessary caution? Ask John Podesta, chairman of Hillary Clinton’s presidential elections campaign. This is exactly how he (or the operator of his email account) gave away his accounts credentials to hackers. The breach led to a series of damaging and embarrassing leaks which might have cost his boss her chance of becoming president. Continue reading
By Muhammad Asfand Yar, List Enthusiast
Everybody seems to love WiFi. So do I. After all, who doesn’t want to have seamless internet access, across different devices, while roaming around their house. But this apparent ease of installation and usefulness can make your WiFi network slow sometimes and vulnerable to attacks. To help you out, here is an infographic by List Enthusiast which discusses how we can improve the overall state of our home WiFi networks.
Here are some of the main takeaways from that infographic about how to boost signal range and WiFi security. Continue reading
The main takeaway from the buildup of developments in the cybersecurity landscape is that privacy is becoming a commodity. The CIA is spying on your phone. Hackers are breaking into your home. Your documents, emails, messages, can be intercepted. And Congress is empowering ISPs to pry into your communications.
Long story short, nothing remains secret.
Under such circumstances, encryption becomes your best friend, your last line of defense in protecting your information. Continue reading