IoT devices can be hacked in minutes, warn researchers


Each internet-connected lightbulb is another entrance for hackers looking to break into your network. A number of internet-connected devices are so lacking in even the most basic cybersecurity protocols that it's possible to hack them in as little as three minutes, allowing cyberattackers to steal data, conduct espionage on enterprise activities, or even cause physical damage. The poor security in Internet of Things products -- including IP connected security systems, connected climate control and energy meters, smart video conferencing systems, connected printers, VoIP phones, smart fridges, and even smart lightbulbs -- pose an inherent risk to the security of organisations which deploy them, researchers have warned. The dangers of such devices are outlined in ForeScout's IoT Enterprise Risk Report, which is based upon research by ethical hacker Samy Kamkar -- and it doesn't make good reading for IoT product vendors or organisations which have deployed such items. Not only do these devices pose significant risks due to a lack of rudimentary security, but many were found to be operating with out-of-date firmware.

Disposable IoT ready to open new opportunities


The Internet of Things (IoT) has transformed how industries operate and how people interact with one another. We have seen an impressive array of new IoT deployments from an explosion of smart city applications across the U.S., to sensors implanted in the horns of critically-endangered rhinos in Africa. IoT devices outnumbered the world's population for the first time this year. Technological advancements in end-devices produced low-power transceivers and simple provisioning mechanisms. It is expected that the consumer segment is the largest user of connected "things" representing 63 percent of the overall number of applications in use.

Europe is prepared to rule over 5G cybersecurity


The European Commission's digital commissioner has warned the mobile industry to expect it to act over security concerns attached to Chinese network equipment makers. The Commission is considering a defacto ban on kit made by Chinese companies including Huawei in the face of security and espionage concerns, per Reuters. Appearing on stage at the Mobile World Congress tradeshow in Barcelona today, Mariya Gabriel, European commissioner for digital economy and society, flagged network "cybersecurity" during her scheduled keynote, warning delegates it's stating the obvious for her to say that "when 5G services become mission critical 5G networks need to be secure". Geopolitical concerns between the West and China are being accelerated and pushed to the fore as the era of 5G network upgrades approach, as well as by ongoing tensions between the U.S. and China over trade. "I'm well away of the unrest among all of you key actors in the telecoms sectors caused by the ongoing discussions around the cybersecurity of 5G," Gabriel continued, fleshing out the Commission's current thinking.

Role Of Machine Learning And AI In Healthcare Cybersecurity - Forbes Middle East


Security threats are major concerns to healthcare organizations due to the value and vulnerability of clinical data that is being recorded and distributed. The value of the data comes from the fact that it is historical in nature; it directly affects our ability to safely treat patients, it takes a long time to rebuild, and it contains more than just clinical data, but also a lot of personal, financial, and demographic data, which allows it to be used for wider identity theft. It is persistent, whereas you can change credit cards and their passwords, PINs and account numbers in the event of a breach, you cannot change your mother's maiden name. The vulnerability comes from the fact that there has been a revolution in healthcare with the interconnection of systems, cloud computing, Internet of Health Things (IoHT) and mobile devices and the changes in working practices of clinicians, such as remote monitoring, telemedicine, and working from home. This revolution has not always been matched with the security awareness, policies, practices, and budgets of health care organizations.

Design Principals for Intelligent Environments

AAAI Conferences

This paper describes design criteria for creating highly embedded, interactive spaces that we call Intelligent Environments (IEs). The motivation for building IEs is bring computation into the real, physical world. The goal is to allow computers to participate in activities that have never previously involved computation and to allow people to interact with computational systems the way they would with other people: via gesture, voice, movement, and context. We describe an existing prototype space, known as the Intelligent Room, which is a research platform for exploring the design of intelligent environments. The Intelligent Room was created to experiment with different forms of natural, multimodai human-computer interaction (HCI) during what is traditionally considered noncomputational activity. It is equipped with numerous computer vision, speech and gesture recognition systems that connect it to what its inhabitants are doing and saying. Our primary concern here is how IEs should be designed and created. Intelligent environments, like traditional multimodal user interfaces, are integrations of methods and systems from a wide array of subdisciplines in the This material is based upon work supported by the Advanced Research Projects Agency of the Department of Defense under contract number F30602--94---C---0204, monitored through Rome Laboratory and Griffiss Air Force Base. Additional support was provided by the Mitsubishi Electronic Research Laboratories.