Tag: security

  • Hacks on a plane

    Hacks on a plane

    One of the great concerns about the internet of things is what happens when older computer technology that was never designed to be connected to the net is exposed to the online world.

    A presentation to the Black Hat Conference in Las Vegas this Thursday by researcher Ruben Santamarta promises to show some of the vulnerabilities in aircraft avionic systems.

    Today’s aircraft are extremely smart devices with the downsides shown in the tragedy of AF447 where an Air France jet plunged into the Atlantic Ocean when two undertrained pilots didn’t understand what their plane was doing as it encountered severe ice conditions in a storm.

    With aircrew increasingly dependent upon computers to help them fly planes, the risks of bugs or security weaknesses in aircraft systems is a serious issue and with the continued mystery of MH370’s fate adds an element of speculation that a glitch of some form was responsible for its disappearance.

    It wouldn’t be the first time a passenger plane came to grief because of a computer error; most notably Air New Zealand flight 901 crashed into Antarctica’s Mount Erebus during a 1979 sightseeing trip due to wrong information being loaded into the navigation system.

    The internet adds numerous risk factors to aircraft – Santamarta’s hack allegedly works through in plane WiFi systems – particularly given these avionics systems haven’t been designed to deal with unauthorised access into their networks.

    Should Santamarta’s demonstration prove feasible, it will be an important warning to the aviation industry and the broader Internet of Things community that security is a pressing issue in a world where critical equipment is connected.

    Similar posts:

    • No Related Posts
  • The internet of insecure things becomes a problem

    The internet of insecure things becomes a problem

    Following yesterday’s posts on BlackBerry, security and the Internet of Things, HP Fortify released a report saying seventy percent of IoT devices are vulnerable to hackers.

    The list of weaknesses is chilling and illustrates why IoT security is an issue that has to be resolved now.

    It may well be that John Chen, BlackBerry’s CEO, has backed the right horse for his company.

    Similar posts:

    • No Related Posts
  • The strength of keeping things simple

    The strength of keeping things simple

    This week I’m in New York to attend the BlackBerry Security Summit, more of which I’ll write about later although this story for Technology Spectator covers much of the news from the day.

    BlackBerry is struggling to find relevance after losing its way when Apple and Android smashed their business model of providing secure, reliable and email friendly phones.

    Now in post Snowden world, BlackBerry under new CEO John Chen is looking to rebuild the company’s fortunes on its strengths in security.

    One of the aspects Chen’s team is emphasising is the simplicity of their software. Dan Dodge, who heads BlackBerry’s QNX embedded devices division says their operating system has a 100,000 lines of code as opposed to hundreds of millions in Windows and Android.

    That weakness in the established software packages is something illustrated in today’s story about a verification problem in Android due to reuse of old code from another older product.

    Simplicity is strength is Dodge’s message and that idea could probably be applied to more than software.

    In the complex times we live in, simplicity could be the key to success.

    Similar posts:

  • Jailbreaking the Internet of Things

    Jailbreaking the Internet of Things

    The news that hackers have turned their attention to Nest thermostats raises some delicious possibilities for the Internet of Things.

    Jailbreaking smartphones has been normal for years as people circumvent restrictions to add features or software and there’s no reason that this can’t be done to smart thermostats, light bulbs or kettles.

    Almost all the smart devices being deployed have processors and capabilities far greater than what’s needed to carry out their designed purpose, so an imaginative hacker can do some interesting things with a jailbroken home automation system.

    Using your kettle to control your lights or fridge to open your garage door is a bit of gimmick but there’s plenty of potential for doing some cool, and mischievous, things.

    While hacking the smart home for kicks might be relatively harmless, tinkering with industrial devices could have unintended and disastrous consequences. It’s another example why security is one of the top concerns as the Internet of Things is rolled out.

    Similar posts:

    • No Related Posts
  • Security in the age of connected kettles

    Security in the age of connected kettles

    A few weeks back I gave a presentation to the Australian Seniors Computer Clubs Association as part of Staying Safe Online Week.

    The presentation, Security In The Age of Connected Kettles, looked at where we are today with online security and some of the challenges facing individuals, businesses and communities as threats become more pervasive with cloud computing, personal technology and the internet of things while the people creating these risks become more professional.

    Overall, it’s not a cheery scenario and I end with a call to action that we have to start insisting business, public sector and political leaders start taking online security seriously as a public safety issue.

    Over ten slides we covered where we are today in personal and small business online security and some of the challenges facing individuals as computing moves onto the cloud and smartphones.

    The ongoing online safety battle

    Online safety is evolving as we move from PCs to tablets and smartphones, today the risks are increasingly appearing on our mobile devices although the desktop computer and email scams remain the biggest risk.

    It’s increasingly about the money

    A change to the security landscape in recent times has been the rise of professional malware. While a decade ago most of the hacks and viruses we saw were the work of people demonstrating their skills or causing mischief, today there is big money in compromising computers and capturing data.

    The rise of ransomware

    One of the best examples of the professionalisation of the internet’s bad guy is the rise of ransomware.

    Ransomware locks your computer with a demand for payment to release your data; if you don’t pay you lose all your information.

    Many of the online threats though are far more subtle; the theft of data from Target, compromises of Sony’s customer databases and ongoing security breaches illustrate how the risks are far greater than just on our desktop.

    Smartphone lockups

    Ransomware has moved off personal computers onto smartphones with both Android and Apple systems being attacked.
    The ‘hacked by Oleg Pliss’ message is a good example of how Apple’s products are just as much at risk as other companies’ platforms.
    Also the ‘hacked by Oleg Pliss’ lockup shows how the security aspects of cloud computing services are going to become more important to the average person.

    Security basics

    The basic advice for the average user remains the same;

    • Strong passwords
    • Don’t use common passwords
    • Be careful what you click on or visit
    • Keep your systems up to date
    • Have good security software

    However times are changing and many security issues are out of the average person’s control.

    Lessons from Heartbleed

    The Heartbleed Open SSL bug illustrated the limits of individuals in protecting their information. As a bug in the secure socket layer software, the Heartbleed Bug could expose sensitive data on websites using the service.

    The disappointing thing with Heartbleed is that people following good security policies were vulnerable.

    Probably the biggest threat with Heartbleed however is the Internet of Things, where relatively simple devices – the connected kettle – could expose security credentials.

    The Target hack

    Another example of how security is beyond the control of the individual user is the Target hack. Hackers found their way into the US department store’s network though an airconditioning contractor. From there, they were able to steal millions of customer payment details.

    The Target hack is one of dozens of similar coporate security compromises and this will continue until security is taken seriously by company directors and regulators.

    A pocket sized security breach

    As the Oleg Pliss hack showed, smartphones are not immune to security breaches.

    With our phones gathering increasingly more data on our behaviour, protecting the data they gather is going to become one of the biggest challenges facing us.

    Rich data

    Smartphones are not just gathering location data, as technologies like iBeacons roll out more information is being gathered from more sources.

    When we go shopping, attend a football game or visit the doctor these technologies are collecting information on our personal habits and behaviour.

    Not a generational issue

    One of the myths around security and privacy is that concerns revolve around the generations.

    The idea that only older people care about privacy or that younger folk understand technology is a myth.

    Unfortunately however our political and business leaders come from a segment of society that doesn’t care about or understand the technology or issues.

    If meaningful change is to be made in securing our information, then we’re going to have to demand our business and political leaders take these issues seriously.

    Similar posts:

    • No Related Posts