Articles about internet of things

Project ACRN logo

Linux Foundation backs new ‘ACRN’ hypervisor for embedded and IoT

UPDATED The Linux Foundation has announced a new hypervisor for use in embedded and internet of things scenarios. Project ACRN (pronounced “acorn”) will offer a “hypervisor, and its device model complete with rich I/O mediators.” There’ll also be “a Linux-based Service OS” and the ability to “run guest operating systems (another …
Simon Sharwood, 19 Mar 2018
Image by Christian Mueller

Hackers create 'ghost' traffic jam to confound smart traffic systems

Video How many “adversarial vehicles” do you need to befuddle smart traffic lights? Just one, according to research published in late February. Five researchers from the University of Michigan attacked the traffic control system the US Department of Transportation has been using for trials since 2016. Called I-SIG (Intelligent …
Internet of things in the cloud

Good luck saying 'Sorry I'm late, I had to update my car's firmware'

The IETF has noticed how badly Internet of Things firmware is managed, and wants it fixed. Whether it's the Mirai botnet's attack on Dyn, smart sex toys with dumb vulns, or easily hackable home routers, the problem is often that firmware fixes are needed but too often aren't installed. The Software Updates for Internet of …

With IoT you too can turn your home into a giant flashing 'HORSE BIRTH NOW' klaxon

An American company has devised a system that takes over your entire home, makes all your lights start flashing and broadcasts neighing noises through the whole house when your pregnant horse starts giving birth. Custom electronics trade news website CE Pro, reporting on this interesting mashup of smart home and Internet of …

FBI tells Jo(e) Sixpack to become an expert in IoT security

Internet of Things users need to become sysadmins, America's Federal Bureau of Investigation says. That's a summary of the Feds' blog post, published this week, in which the agency's Beth Anne Steele wrote that Things are best deployed on their own network, with an off-switch. Steele's post offered a checklist explaining how …
Power plant + electricity pylons at sunset

Why bother cracking PCs? Spot o' malware on PLCs... Done. Industrial control network pwned

Security researchers have demonstrated a new technique for hacking air-gapped industrial control system networks, and hope their work will encourage the development of more robust defences for SCADA-based systems. Air-gapped industrial networks are thought to be difficult if not impossible to hack partly because they are …
John Leyden, 12 Dec 2017
Woman looks in rear view mirror. Photo by SHutterstock

Fujitsu imagines adjusting your rear view mirror for better hearing

Fujitsu Ten, the Japanese giant's automotive outfit, has developed technology that turns sheets of glass into speakers and thinks it could be used to help drivers talk on the phone without disturbing passengers. The company recently built the glass into what it's called an “automative superdirective speaker” that it packed …
Simon Sharwood, 24 Nov 2017
Couple shocked by something on a smartphone

Stop your moaning, says maker of buggy Bluetooth sex toy

Sex-toy maker Lovsense has told its customers to stop moaning about one of its products, which recorded audio of users as they – ahem – played, and stored it on their Android phones. News of the recording emerged on Reddit where an entity by the name of “tydoctor” wrote “control vibrator app (used to control remote control sex …
Simon Sharwood, 13 Nov 2017
People diving off a cliff

C'mon, edgelords: The APIs are ours to command – do we do good or evil?

Edge computing is the pendulum swinging away from the idea of big, centralised servers back to distributed systems. It's the idea that instead of centralising all of our workloads in big clouds we bring the computing closer to the devices requesting that compute power. The idea is that edge computing solves whole new classes …
Trevor Pott, 31 Oct 2017

Updating Things: IETF bods suggest standard

A trio of ARM engineers have devoted some of their free time* to working up an architecture to address the problem of delivering software updates to internet-connected things. Repeated IoT breaches – whether it's cameras, light bulbs, toys or various kinds of sex toys – have made it painfully clear that too many Things aren't …
Man peers into fridge with odd look on his face. Photo by shutterstock

Australia's IoT security rating might work, if done right

INTERVIEW As Vulture South reported Monday, Australia's government hopes to have consumer Internet of Things products given security “star ratings” of some kind, so consumers know what they're buying. The notion seems problematic: for example, what does a five-star security rating on a security camera mean, if it's attached to a router …

'Cyber kangaroo' ratings for IoT security? Jump to it, says Australia's cyber security minister

Australia's government hopes that somewhere in the world, a vendor of consumer-grade connected electronics is willing to admit it's rubbish at security by giving itself a low score in a proposed safety rating system. The idea of security ratings for internet things emerged during last year's 360° Cyber Security Game, co-hosted …
Mattel Aristotle PR image

Mattel's Internet-of-kiddies'-Things Aristotle canned before release

Mattel's Aristotle, a kid's-Alexa-only-more-creepy, won't get the chance to invade children's bedrooms after all: the company's cancelled it. CTO Sven Gerjets didn't tell the Washington Post why the product did not “fully align with Mattel's new technology strategy”, only that the decision was made after he reviewed the …
Washington University sensor as a skin patch

Chirpy, chirpy, cheap, cheap: Printable IoT radios for 10 cents each

One of the favoured low-power radio techniques in Internet of Things research is “backscatter communications”: the transmitter sends a signal to a Thing, and the Thing modulates its data onto the reflection, and that's then decoded by a receiver. The problem with such a passive comms scheme is that its distance is limited to …
Face Palm D'oh from Shutterstock

Dangle a DVR online and it'll be cracked in two minutes

Criminals are constantly attempting to log into digital video recorders by using their default credentials, the SANS Institute has found. The organisation revisited recorders because their lack of security helped the Mirai botnet run riot in October 2016, thanks to its modus operandi of logging into devices using their default …
Simon Sharwood, 29 Aug 2017

Dahua IP cameras stung by Web interface bug

Chinese camera-maker Dahua has flicked out a patch to fix a possible remote code execution vulnerability in its Web admin interface. The company uses a Web interface named as “Sonia”* in this CERT advisory – and there's a stack buffer overflow to fix. Unpatched, the advisory states, various versions of the Dahua firmware don' …

'Millions of IoT gizmos' wide open to hijackers after devs drop gSOAP

Security researchers investigating internet-connected video cameras have uncovered a bug that could conceivably leave millions of devices open to easy pwnage. The team from embedded security specialists Senrio was looking into the code running an M3004-V network camera from Axis Communication. They found a serious hole in the …
Iain Thomson, 19 Jul 2017

YASA* looks at turning commercial buildings into Internet things

A vendor collective pushing Internet of Things standardisation for commercial buildings has published its first set of specifications, and wonder-of-wonders the specs include security. In evidence that the world's fast running out of tortured names that don't sound stupid in English or funny/obscene in other languages, the …

Create a news alert about internet of things, or find more stories about internet of things.

Biting the hand that feeds IT © 1998–2018