US government report highlights gaps in battle against botnets
|
|
Researchers from the University of Michigan and Stony Brook University published a paper explaining a novel approach to IoT security challenges (pdf). The researchers pose the question:
“What are the new intellectual challenges in the science of security when we talk about the Internet of Things, and what problems can we solve using currently known security techniques?”
This research approach is very accessible because it uses existing categories and concepts by comparing security methods developed for smartphones, PCs and the cloud to identify the gaps and challenges to IoT security. The IoT stack is defined with the familiar layers:
To read this article in full or to leave a comment, please click here
Venture Capital Post |
Security software developers identify gaps on Mobile Security of Android and Apple
Venture Capital Post McLennan was able to identify that Android Security use Java software. He said, "Java is completely useless for code that needs security, as it takes mere minutes to influence or subvert this code." It means that virus can easily attack Android devices … |
Ars Technica |
Scientist-developed malware prototype covertly jumps air gaps using inaudible …
Ars Technica The hurdles of implementing covert acoustical networking are high enough that few malware developers are likely to add it to their offerings anytime soon. Still, the requirements are modest when measured against the capabilities of Stuxnet, Flame, and … Scientists prove ultrasound-whispering malware concept |