TORONTO — Emerging use cases are revealing the many ways memory technologies can be an avenue for threat actors to create havoc, whether for stealing data or sending malicious instructions.
Security features in memory aren’t new, of course. The “s” in SD card initially stood for “secure,” but the SD Association hasn’t really emphasized it for a decade, while electrically erasable programmable read-only memory (EEPROM) has long been used for applications that need embedded security such as credit cards, SIM cards and key-less entry systems, among others.
But as different kinds of memory are put into a wider variety of systems — such as automotive, manufacturing and the Internet of Things (IoT) — the need for security has greatly increased. The question is not only where that security will be integrated, but how it will be managed, especially in embedded memories that are expected to remain in a device for years, possibly decades.
Read the full story on EE Times.
Last year was the worst year to date for cyber attacks, but many predict 2018 will be even worse.
Given how 2018 is going so far, that’s not hard to believe. The frequency of high-profile breaches is only increasing, and the payouts hackers enjoy are getting bigger. In an environment where cybercrime prevention can feel like a losing battle, how can you help your company stay secure?
Read the full story on Tektonika.
It seems like just yesterday everyone was gearing up to secure their organization for the anticipated BYOD deluge. Today, IoT security has quickly evolved to become the new front line in our connected world.
In early February, a grey-hat hacker compromised as many as 150,000 printers using an automated script that searches for open printer ports to send out rogue print jobs. He was able to affect printers of all makes and sizes at both large enterprises and small town restaurants. This hacker claimed he didn’t intend to cause harm, according to reports. Instead, he was educating people to the dangers of exposed devices and holes in IoT security. The reality is that the consequences of a single, exposed device can be far worse depending on what networks it’s connected to.
Read my full story on Tektonika.
Hosted data centers have become a common avenue for enterprises to access and deliver IT services, but they’re also a hit with cyber criminals.
According to a recent report by ThreatMatrix, there is a correlation between top U.S. cities for online fraud and those that are home to hosted data centers, with Tampa, Fla. topping the list, followed by New York. Major U.S. cities rounding out the top 10 included Los Angeles, Atlanta and Chicago. [Read the full story on IT World Canada]