Articles about iot

Internet of Things

Don't put the 'd' and second 'i' in IoT: How to secure devices in your biz – belt and braces

Comment The enterprise is filling up with devices. Gone are the days when the only IT kit our staff used was phones, printers, scanners, desktop PCs, and servers that were bought, configured, installed, and maintained by our IT team. Now we have more different types of device than you can comfortably shake a stick at – which, of …
Dave Cartwright, 14 Sep 2018
Photo by Kaspars Grinvalds / Shutterstock

2-bit punks' weak 40-bit crypto didn't help Tesla keyless fobs one bit

Video Boffins have sprung the bonnet on the weak crypto used in the keyless entry system in Tesla's Model S car. Researchers from the Computer Security and Industrial Cryptography (COSIC) group – part of the Department of Electrical Engineering at Belgian university KU Leuven – were able to clone a key fob, open the doors, and drive …
John Leyden, 12 Sep 2018
printer

Thousands of misconfigured 3D printers on interwebz run risk of sabotage

Internet-connected 3D printers are at risk of being tampered with or even sabotaged because users fail to apply security controls, a researcher has warned. Xavier Mertens, a senior handler for the SANS Internet Storm Center (ISC) and freelance cybersecurity consultant, found more than 3,700 3D printers directly connected to …
John Leyden, 4 Sep 2018
Huawei AI Cube

Huawei's Alexa-powered AI Cube wants to squat in your living room too

IFA Alexa is built into so many appliances being demonstrated at IFA this week, you need a map* to them all. Basically it's everywhere, and on a global scale appears to be decisively winning the platform battle with Google. So it's no surprise that Huawei's first attempt at cracking the European consumer electronics business …
Andrew Orlowski, 31 Aug 2018
Woman in hospital (in hospital gown) covers face with hands

If it doesn't need to be connected, don't: Nurse prescribes meds for sickly hospital infosec

BSides Manchester A children's nurse prescribed hospitals ways to improve their computer security at the BSides conference in Manchester, England, earlier this month. Jelena Milosevic developed an interest in cybersecurity over the past four years while working as an on-call nurse in several hospitals across the Netherlands, where she said …
John Leyden, 23 Aug 2018
Pull the plug

Security MadLibs: Your IoT electrical outlet can now pwn your smart TV

A security vulnerability in "smart" power plugs can be exploited to infiltrate local computer networks. The flaw, spotted in Belkin's Wemo Insight smartplugs, would potentially allow an attacker to not only manipulate the plug itself, but also allow hopping to other devices connected to the same Wi-Fi home network. …
Shaun Nichols, 21 Aug 2018
Man holds the BMW f30 key fob with an apple watch showing the connected drive information.

Connected car data handover headache: There's no quick fix... and it's NOT just Land Rovers

The perils of previous owners retaining unfettered access to the data and controls of connected cars after resale is a wider problem across the industry, The Register has discovered. We have confirmed that BMW, Mercedes-Benz and Nissan may all have much the same issue as Jaguar Land Rover, the focus of our recent article on …
John Leyden, 21 Aug 2018
Portion of US Patent 6368268

Now you can tell someone to literally go f--k themselves over the internet: Remote-control mock-cock patent dies

It is a great day for those who dream of Internet-of-Flings sex toys. A key patent describing web-connected remote-controllable techno-dildos has expired. Friday marks the 20-year anniversary, and, ahem, climax of, US Patent 6,368,268, a controversial piece of intellectual property that has long been blamed for holding back …
Shaun Nichols, 17 Aug 2018

IoT shouters Chirp get themselves added to Microsoft Azure IoT

Audio IoT networking firm Chirp has convinced Microsoft to integrate its tech into the Azure IoT platform. Chirp’s hookup with Microsoft’s Azure IoT platform comes a few weeks after it rolled out a free tier for SDK access. CTO James Nesfield told us: “We’re able to add a really elegant onboarding capability without adding to …
Gareth Corfield, 15 Aug 2018

Medical device vuln allows hackers to falsify patients' vitals

Hackers may be able to falsify patient vitals by messing with the traffic on hospital networks. Research from McAfee shows it’s possible to emulate and modify a patient’s vital signs in real time on a medical network using a patient monitor and a central monitoring station. Most patient monitoring systems comprise a minimum …
John Leyden, 14 Aug 2018
Used car salesman flogs watches from his undercoat

Second-hand connected car data drama could be a GDPR minefield

What are the implications under GDPR of a previous owner retaining access to data and control of a connected car after it is sold on? Although El Reg's initial story on the topic focused on the experience of two Jaguar Land Rover owners and the car maker's response, it has become clear this is an industry-wide issue and cars …
John Leyden, 9 Aug 2018
The FBI seal on a building

The wheel turns slowly, but it turns: Feds emit IoT security tip sheet

The US Federal Bureau of Investigation has offered advice on securing Internet of Things devices to prevent "Cyber Actors" using your garage door for nefarious purposes. The cheat sheet, following hot on the heels of tips on how to fend off cyber attacks last year, includes an explanation of what a Cyber Actor is (sadly, not a …
Richard Speed, 3 Aug 2018
A hipster man with shades claps, saying bravo

Porn parking, livid lockers and botched blenders: The nightmare IoT world come true

Some time in the near future, you may go to a parking kiosk and rather than be presented with a $5 fee request, get confronted with low-res porn images. Likewise that locker at the gym may be used to send your bank account details to cybercriminals. And even your blender could be spying on you. That is the nightmare internet- …
Someone running with the power of IoT

Arm reckons its 'any device, any data, any cloud' IoT tech has legs

Arm – the designer of processors used in billions of gadgets, smartphones, and other devices – has launched a new Internet-ofThings platform that it claims will be able to handle any data from any device on any cloud. There's no shortage of organizations offering IoT solutions, but Arm claims its Pelion IoT platform stands out …
Man faceplants in airbag

Shock Land Rover Discovery: Sellers could meddle with connected cars if not unbound

Both data and the online controls on "connected cars" from Jaguar Land Rover remain available to previous owners, according to security experts and owners of the upmarket vehicles. The car maker has defended its privacy safeguards and security of its InControl tech. El Reg began investigating the issue after talking to Matt …
John Leyden, 27 Jul 2018
Networks city concept. Phtoo by shutterstsock

Some Things just aren't meant to be (on Internet of Things networks). But we can work around that

Analysis What exactly is the Internet of Things? According to Gartner and IDC, it's a network of endpoints capable of interacting with each other and the world via IP connectivity. Consultant McKinsey & Company defines IoT as sensors and actuators embedded in physical objects, from roadways to pacemakers, that churn out huge amounts of …
Dave Cartwright, 25 Jul 2018

Who watches Sony's watcher? Boffins poke holes in surveillance kit

Security researchers at Cisco Talos have found two serious flaws with Sony's network-facing surveillance kit, the IPELA E Series Network Camera. A command injection vulnerability in the measurementBitrateExec functionality could be abused to cause arbitrary commands to be executed in response to a maliciously contracted HTTP …
John Leyden, 23 Jul 2018
Cat stares at vacuum cleaner robot. Photo by shutterstock

Doctor, doctor, I feel like my IoT-enabled vacuum cleaner is spying on me

Vulnerabilities in a range of robot vacuum cleaners allow miscreants to access the gadgets' camera, and remote-control the gizmos. Security researchers at Positive Technologies (PT) this week disclosed that Dongguan Diqee 360 smart vacuum cleaners contain security flaws that hackers can exploit to snoop on people through the …
John Leyden, 20 Jul 2018

Create a news alert about iot, or find more stories about iot.

Biting the hand that feeds IT © 1998–2018