Tag Archive for: Hardware

ERI’s John Shegerian Describes the Dangers of Hardware Hacking and the “Insecurity of Everything” on Security Ledger Podcast


Press release content from Business Wire. The AP news staff was not involved in its creation.

FRESNO, Calif.–(BUSINESS WIRE)–Sep 23, 2021–

John Shegerian, Chairman/CEO of ERI, the nation’s leading fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company, is a featured guest on the current episode of the “ Security Ledger ” podcast.

The show, hosted by Paul F. Roberts, the founder and Editor in Chief of The Security Ledger, an independent security news and analysis publication that explores the intersection of cyber security with the Internet of Things, features interviews with leading minds in the area of cyber security, threats and attacks. The Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.

In the current episode, Shegerian discusses his latest book, The Insecurity of Everything, and the various aspects of hardware security that are often overlooked in today’s society, both by consumers as well as businesses.

“It was an honor to talk with Paul and be featured on his excellent and informative podcast, the Security Ledger, sharing information on one of the most critical and pressing issues in the world today – the hardware hacking of private data,” said Shegerian. “Protection of privacy has become a greater issue than ever before. It is important that we share vital best practices for protecting digital privacy and security with the cybersecurity community and beyond.”

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States. ERI is certified at the highest level by all leading environmental and data security oversight organizations to de-manufacture, recycle, and refurbish every type of electronic device in an…

Source…

Cyber Hardware Launches for Cybersecurity Awareness Month


Press release content from Globe Newswire. The AP news staff was not involved in its creation.

ST. LOUIS, Sept. 29, 2021 (GLOBE NEWSWIRE) — US Military hardware developed by Q-Net Security is now being made available to US civilian consumers in response to the rapid increase in cyberattacks. Experts hope the new plug-and-play technology will be quickly rolled out to help repel cyberattackers from targeting US civilian infrastructure—attacks which happened in recent months to both Colonial Pipeline and JBS Foods.

“Face it. Cyberspace is getting more dangerous every day”, says Intel’s Steven Liebson in a recent article.

“We now have US made-and-owned technology to protect civilian infrastructure with intelligence-grade security. We’ve made securing a networked device as simple as plug-and-play,” says Q-Net CEO Dr. Ron Indeck. “Now, there are no more excuses”. 

Hardware-based security—known as HardSec—has already been embraced by the US Air Force and a suite of US Government agencies, and is now being adopted by leading utilities.

The newly-revealed technology—known as a Q-Box—utilizes purpose-defined hardware in an Intel® Cyclone® FPGA. Unlike traditional cybersecurity software, the FPGA chips are programmed with physical pins, and since they run no software, they cannot be hacked remotely. This technology provides protection without requiring changes or additions to an endpoint’s legacy code and with no modifications to existing equipment.

“The idea is simple cloaking technology”, explains Dr. Indeck. “You can’t attack what you can’t see”.

The Q-Box can be used to protect a wide range of networked devices including ATMs, gaming machines, and Operational Technology (OT) networks in buildings, factories, refineries, and utilities.

Experts agree that software security programs have become obsolete in the era of sophisticated nation-state attacks.

“We already know that no cybersecurity software is provably secure,” says Dr. Jerry Cox, founding chairman of the Department of Computer Science at Washington University in St. Louis.

Source…

To Secure the Internet of Things, We Must Build It Out of “Patchable” Hardware


Photo: Jamie Chung
Photo: Jamie Chung

On 21 October of last year, a variety of major websites—including those of Twitter, PayPal, Spotify, Netflix, The New York Times, and The Wall Street Journal—stopped working. The cause was a distributed denial-of-service attack, not on these websites themselves but on the provider they and many others used to support the Domain Name System, or DNS, which translates the name of the site into its numerical address on the Internet. The DNS provider in this case was a company called Dyn, whose servers were barraged by so many fake requests for DNS lookups that they couldn’t answer the real ones.

Distributed denial-of-service attacks are common enough. But two things made this attack special. First, it hobbled a large DNS provider, so it disrupted many different websites. Also, the fake requests didn’t come from the usual botnet of compromised desktop and laptop computers. Rather, the attack was orchestrated through tens of millions of small, connected devices, things like Internet-connected cameras and home routers—components of what is often called the Internet of Things, or IoT for short.

For several years now, the number of things connected to the Internet—including phones, smart watches, fitness trackers, home thermostats, and various sensors—has exceeded the human population. By 2020, there will be tens of billions of such gadgets online. The burgeoning size of the Internet of Things reflects the fastest economic growth ever experienced for any sector in the history of human civilization.

For the most part, this development promises great excitement and opportunity for engineers and society at large. But there is a dark cloud hanging over the IoT: the concomitant threats to security and privacy, which will be of a scale never experienced before.

Our digital systems are vulnerable to malicious hackers attempting to gain unauthorized access, steal personal data and other information, hold the information they steal for ransom, and even bring systems down completely, as happened with the attack on Dyn. The result is an ongoing arms race between hackers and computer-security experts, forcing the rest of us to live on a treadmill of security…

Source…

Global Digital Security Control Market- Industry Analysis and Forecast (2019-2027) – By Hardware, Service, Software, Application, and Region.


Maximize Market Research

Maximize Market Research has published the “Global Digital Security Control Market Report 2021”, which has covered the comprehensive analysis of market by different segment as well as demand & supply study and gaps between the same by region. The report gives an exclusive insights in key players by region with competitive landscape of the market. The market share in the industry is given by key players, which helps user of the report to understand the market structure at glance.Key players in the industry are profiled in the report that give strategic insights of the companies with their top line and plans of expansion in near tern with M&A policies. Profiles of companies will help user to understand the most revenue generating segments for the companies including products, region.

Global Digital Security Control Market is expected to grow at a CAGR of % in the forecast period of 2020 to 2027. The report has covered the market dynamics including demand drivers, restraints and opportunities by region. External factors and internal factors of companies affecting the growth of the companies and ultimately adding the total market are analysed in the report.
Global Digital Security Control Market, Dynamics:

The digital security control solutions are most widely preferred in an array of application areas like healthcare, telecommunication, and finance. The technology advancement in the digital security control services and its cost reduction benefits are expected to increase the adoption of the digital control system in areas like mobile security, industrial, commercial, and transportation. An increase in adoption of Europay, Mastercard and Visa (EMV) method among population across the globe has helped to reach online transaction to current level. iOn the other hand, hacking is the one of the key challenge for the global digital security control market growth. The report covers the details analysis of the market dynamics like drivers, restraints, opportunities and challenges. The report study has also analyzed revenue impact of the COVID-19 pandemic on the sales revenue of the market leader, market followers and market disrupters in the report and same is reflected…

Source…