The Internet of Things (IoT) was at the peak of Gartner’s Hype Cycle 2014 – just a couple months later it feels like it has fully arrived. More and more devices and applications get connected via Bluetooth, WiFi, NFC and other technologies in order to enhance functionality and usability. Gartner’s Hype Cycle 2014 (image: Gartner) Every new connection is a possible entry point for hackers and has to be secured in some way. Many companies face the challenge of choosing and implementing the adequate security technology for their products and therefore we have collectedRead More
Israel-based mobile security company Skycure discovered an iOS vulnerability which could enable hackers to crash nearby devices and to put them in an unusable state. In order to perform the hack one would need to set up a router with a specific configuration. Apps on iOS devices which connect to it will crash with only a few exceptions. “Basically, by generating a specially crafted SSL certificate, attackers can regenerate a bug and cause apps that perform SSL communication to crash at will.” writes Yair Amit, CTO & co-founder at SkycureRead More
Just a couple weeks ago BMW made headlines when a security research group of the German automobile club ADAC discovered a major security gap in the ConnectedDrive feature. The optional system builds your favourite apps and services into the dashboard of your vehicle and offers additional features like social media integration, Google information for navigation and remote control enabling you to unlock/lock your car or to switch on heating/AC in the vehicle. Facebook App in the BMW ConnectedDrive (image: BMW) The researchers from ADAC reportedly created a fake mobile phone network and tricked nearby cars toRead More
By the end of last year complex spying malware arrived via an USB stick to the work computer of the unit head in the Department for European Policy, where virus-scanning software picked it up. How could this happen? After all, comprehensive security technology should have prevented such an event. Later it turned out that a staff member who works in close contact with German Chancellor Angela Merkel used a private USB stick and a private computer to work on a speech, which made it easy for the malware to accessRead More