- Gigavation Featured as USAF Success Story December 30, 2016
- Gigavation: Seeding the Future December 30, 2016
- NSA Contractor Arrest Highlights Risk from Insider Threats October 13, 2016
- NSA case highlights growing concerns over insider threats October 6, 2016
- NSA contractor charged with stealing top secret data October 6, 2016
- BBC News: Malware-infected USB sticks in Australia September 22, 2016
- Gigavation featured at flagship Detroit Automotive Conference June 15, 2016
- Caution: Cyber Risks Ahead for Connected Cars April 18, 2016
- Industrial Hacking: How Cyber Crime Went Pro February 10, 2016
- “Internet of Things security is so bad, there’s a search engine for sleeping kids” January 24, 2016
- Security Flaw Compromises Location of Nest Thermostat Owners January 24, 2016
- Gigavation featured on Keynote Panel on Cybersecurity at Automotive Conference November 16, 2015
- “Devices need a fresh approach and a new way of thinking about security” August 3, 2015
- “Hackers Remotely Kill a Jeep on the Highway” July 21, 2015
- Gigavation invited to speak at MIT Industrial Liaison Program (ILP) Workshop on Cybersecurity Innovation June 9, 2015
- IoT Predictions for 2020 May 15, 2015
- Gigavation is hiring! April 9, 2015
- Security Moving More Into Hardware Realm, Analysts Say February 6, 2015
- Sensors for the Internet of things and cars will fuel chip growth in 2015, survey says December 9, 2014
- Internet Of Things: 3 Holiday Gifts That Will Keep CISOs Up At Night December 9, 2014
“The situation seems eerily similar to the Edward Snowden leak, and has drawn renewed attention to insider threats and the risks posed by authorized users granted access to sensitive information in corporate networks.
…While insider attacks and leaks of sensitive data from the NSA make for very salacious headlines, insider threats are in no way limited to the NSA or government agencies. Every company has some information and data of a sensitive nature that should not be shared or seen outside the company, and every company faces the risk that an employee with access to that data could expose it—either intentionally or inadvertently.”
“The arrest of a National Security Agency contractor charged with stealing highly classified material is yet the latest example of a trend that officials say can be every bit as dangerous as an outside hacker: the insider threat.
…insider threats pose a delicate and difficult challenge and can be hard to detect, especially since large amounts of data can be downloaded quickly and stored on tiny devices.”
“Rep. Adam B. Schiff (Calif.), the ranking Democrat on the House Intelligence Committee, said in a statement that Martin’s arrest made it ‘painfully clear that the Intelligence Community still has much to do to institutionalize reforms designed to protect in advance the nation’s sources and methods from insider threats.'”
…The devices are “extremely harmful” and should not be used, police say.
It is not uncommon for USB sticks to be used to carry and transmit destructive malware and viruses to computers.
Cybersecurity experts have called the technology “critically flawed“, and in 2014 demonstrated to the BBC how any USB device could be used to infect a computer without the user’s knowledge.”
Gigavation thought leadership on cyber security panel at flagship Detroit Automotive Conference
“From sensors to computers to communications networks, the technology in automobiles today exposes them to an alarming array of potential cyberattacks.”
“By exploiting weaknesses in wireless communications systems or in devices that connect directly to cars (such as smartphones, insurance dongles, or diagnostic tools), hackers could conceivably gain access to data stored on a vehicle that describes its owner’s driving habits, current location, entertainment preferences, or daily schedule.”
“Newer connected vehicles represent an emerging target for hackers because these vehicles are essentially rolling ecosystems of unsecured technologies.”
“The scope, frequency and severity of hacks have increased with every passing year. One of the driving factors behind this, say security experts is a new corporatization and professionalism of hackers. …
‘The stealing of corporate meetings and notes to get a competitive advantage is ridiculously real,’ Barone added, ‘They’re stealing blueprints, because they want to see where this company is going to build next and what their security infrastructure looks like behind it.
Law firms, designers, factories, anyone who can have potentially valuable information can be a target.”
“Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams.”
“The cameras are vulnerable because they use the Real Time Streaming Protocol (RTSP, port 554) to share video but have no password authentication in place.”
“The consumers are saying ‘we’re not supposed to know anything about this stuff [cybersecurity],” he said. “The vendors don’t want to lift a finger to help users because it costs them money.”
“The bigger picture here is not just personal privacy, but the security of IoT devices,” security researcher Scott Erven told Ars Technica UK. “As we expand that connectivity, when we get into systems that affect public safety and human life—medical devices, the automotive space, critical infrastructure—the consequences of failure are higher than something as shocking as a Shodan webcam peering into the baby’s crib.”