Caution: Cyber Risks Ahead for Connected Cars

“From sensors to computers to communications networks, the technology in automobiles today exposes them to an alarming array of potential cyberattacks.”

“By exploiting weaknesses in wireless communications systems or in devices that connect directly to cars (such as smartphones, insurance dongles, or diagnostic tools), hackers could conceivably gain access to data stored on a vehicle that describes its owner’s driving habits, current location, entertainment preferences, or daily schedule.”

“Newer connected vehicles represent an emerging target for hackers because these vehicles are essentially rolling ecosystems of unsecured technologies.”

Read more: http://deloitte.wsj.com/cio/2016/04/18/caution-cyber-risks-ahead-for-connected-cars/

Posted in Uncategorized | Leave a comment

Industrial Hacking: How Cyber Crime Went Pro

TheStreet_Feb2016“The scope, frequency and severity of hacks have increased with every passing year. One of the driving factors behind this, say security experts is a new corporatization and professionalism of hackers. …

‘The stealing of corporate meetings and notes to get a competitive advantage is ridiculously real,’ Barone added, ‘They’re stealing blueprints, because they want to see where this company is going to build next and what their security infrastructure looks like behind it.

Law firms, designers, factories, anyone who can have potentially valuable information can be a target.”

Read more: http://www.thestreet.com/story/13446854/1/industrial-hacking-how-cyber-crime-went-pro.html

Posted in Uncategorized | Leave a comment

“Internet of Things security is so bad, there’s a search engine for sleeping kids”

“Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams.”

“The cameras are vulnerable because they use the Real Time Streaming Protocol (RTSP, port 554) to share video but have no password authentication in place.”

“The consumers are saying ‘we’re not supposed to know anything about this stuff [cybersecurity],” he said. “The vendors don’t want to lift a finger to help users because it costs them money.”

“The bigger picture here is not just personal privacy, but the security of IoT devices,” security researcher Scott Erven told Ars Technica UK. “As we expand that connectivity, when we get into systems that affect public safety and human life—medical devices, the automotive space, critical infrastructure—the consequences of failure are higher than something as shocking as a Shodan webcam peering into the baby’s crib.”

Read More: http://arstechnica.com/security/2016/01/how-to-search-the-internet-of-things-for-photos-of-sleeping-babies/?utm_source=twitterfeed&utm_medium=linkedin

Posted in Uncategorized | Leave a comment

Security Flaw Compromises Location of Nest Thermostat Owners

Nest Thermostat“A security bug discovered by Princeton researchers leaked the location information of Nest Thermostat owners over the Internet.”

“This is not the first security vulnerability from Google’s sister company, Nest, and its first child, the Nest Learning Thermostat. Last year we reported on a 15-second USB hack that would give hackers full remote controls and access to information on the daily whereabouts of owners.”

“Even with these findings Grover considered Nest’s Thermostat to be “one of the more secure devices” in his test. It is not the sort of title that would instill confidence in the security of our future technology.”

Read More: http://www.msn.com/en-us/news/technology/security-flaw-compromises-location-of-nest-thermostat-owners/ar-BBoyymM

Posted in Uncategorized | Leave a comment

Gigavation featured on Keynote Panel on Cybersecurity at Automotive Conference

Gigavation leadership: Keynote Speaker on the Cybersecurity panel at the Automotive USA 2015 Conference alongside OEMs and other telematics experts.

http://www.tu-auto.com/fleet/conference-agenda.php

Atlanta, November 16-17, 2015

TU-Automotive

TU_Auto_Cyber_keynotepanel

Posted in Uncategorized | Leave a comment

“Devices need a fresh approach and a new way of thinking about security”

“‘Cybersecurity is an absolute top priority for automakers,’ said Wade Newton, a spokesman for the Alliance of Automobile Manufacturers, a trade group representing the world’s largest car makers.”

“‘The CAN bus is hopelessly insecure,’ Fisher said. It was developed decades before cars were connected to the Internet and lacks features to block malware programs or reject commands from unauthorized intruders.”

“The low-cost chips used in many Internet of Things devices lack built-in security features…”

“…Sadowski said he believes that Internet of Things developers would benefit from the same kind of crisis mentality. ‘I think we do need a rallying cry like that,’ he said. ‘Many of the developers are probably thinking features first, security second.  . . . What we really need to do is educate the developers and the users as to the potential risks.'”

Read more: http://www.betaboston.com/news/2015/08/03/after-car-hack-internet-of-things-looks-riskier/

Jeep_article_pic

Posted in Uncategorized | Leave a comment

“Hackers Remotely Kill a Jeep on the Highway”

“Drivers shouldn’t have to choose between being connected and being protected.”

Charlie Miller, a security researcher at Twitter, and Chris Valasek, director of Vehicle Security Research at IOActive, have exposed the security vulnerabilities in automobiles by hacking into cars remotely, controlling the cars' various controls from the radio volume to the brakes. Photographed on Wednesday, July 1, 2015 in Ladue, Mo. (Photo © Whitney Curtis for WIRED.com)

“‘This might be the kind of software bug most likely to kill someone.’ In fact, Miller and Valasek aren’t the first to hack a car over the Internet. In 2011 a team of researchers from the University of Washington and the University of California at San Diego showed that they could wirelessly disable the locks and brakes on a sedan. But those academics took a more discreet approach, keeping the identity of the hacked car secret and sharing the details of the exploit only with carmakers.”

Read more: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

Posted in Uncategorized | Leave a comment

Gigavation invited to speak at MIT Industrial Liaison Program (ILP) Workshop on Cybersecurity Innovation

MIT_ILP_Startup_Exchange

“Cybersecurity innovation is a recognized goal across industry, and in society, due to the increasing threat of cyber espionage and crime as well as the importance of maintaining simple user interfaces. MIT Startup Exchange (STEX) is convening a workshop to discuss the latest advances in cybersecurity from the perspective of corporates, academics, VCs, and startups in the MIT ecosystem redefining the field today.”

Read more: http://startupexchange.mit.edu/startupexchange/html/index.html#viewOpportunity/63

Posted in Uncategorized | Comments Off on Gigavation invited to speak at MIT Industrial Liaison Program (ILP) Workshop on Cybersecurity Innovation

IoT Predictions for 2020

“By 2020, it is predicted that there will be around 50 billion such smart, connected devices. The world’s population then will be around 7 billion. There will be more Things on the Internet than People on the Internet, making this the Internet of Things. Each of us will own multiple devices on the IoT that will influence our life. So, the impact that the Internet has on lives today will seem trivial as compared to what is possible with the IoT.”

Read more: http://blog.claricetechnologies.com/2014/03/demystifying-the-internet-of-things/

clarice_Iol_predictions_20201

Posted in Uncategorized | Comments Off on IoT Predictions for 2020

Gigavation is hiring!

Gigavation offers an exciting environment to work with a world-class team on cutting-edge technology. We are looking for Software Developers with experience coding in C to join Gigavation’s product development team. Interested? Check out our Careers Page here.

Posted in Uncategorized | Comments Off on Gigavation is hiring!