Saturday, September 10, 2011

Hacking Targets Multiply

Wall Street Journal (09/09/11) Jennifer Valentino-DeVries 

U.S. government officials and security researchers warn that cyberattacks are a growing threat for all types of devices as they become linked to the Internet or cell phone networks. "They aren't just in automotive systems but in security systems, industrial control systems, medical devices," says iSec Partners' Don Bailey. He and iSec colleague Mathew Solnik recently demonstrated that they could unlock and start a car by sending text messages to the vehicle's alarm system, and the implication is that this same method could be used to interfere with businesses or critical services. The researchers point out that devices connected to a cellular network have several vulnerabilities, including chips that may not be able to manage complex security measures, and an inability to authenticate the network they receive messages from. The U.S. Department of Homeland Security (DHS) is working with technology manufacturers and users to understand the dangers, and a DHS official notes that protecting the devices is especially challenging because they cannot easily be patched on a routine basis. Bailey says that better microcontrollers could mitigate some hacking threats, while devices also should be required to authenticate the sources of messages and their networks.

9 comments:

  1. With the high costs of home health care personnel, rehabilitation centers, medication, home medical equipment and doctor's visits, there is typically little-to-no money left over. mobile medical alert systems

    ReplyDelete
  2. Positive site, where did u come up with the information on this posting?I have read a few of the articles on your website now, and I really like your style. Thanks a million and please keep up the effective work. гидра онион

    ReplyDelete
  3. Nice information, valuable and excellent design, as share good stuff with good ideas and concepts, lots of great information and inspiration, both of which I need, thanks to offer such a helpful information here. Ceh training in mumbai

    ReplyDelete
  4. All your hard work is much appreciated. Nobody can stop to admire you. Lots of appreciation. гидра тор

    ReplyDelete
  5. It was wondering if I could use this write-up on my other website, I will link it back to your website though.Great Thanks. сайт гидры

    ReplyDelete
  6. Smartphones have come a long way leading to this point in time when we are discussing spy apps
    So, what do these iPhone spy apps do? Normally, iPhone spying apps are popular among couples who are doubtful of their spouse cheating on them.If you are curious about it, you can access here and view more.

    ReplyDelete
  7. Superbly written article, if only all bloggers offered the same content as you, the internet would be a far better place.. dark web links

    ReplyDelete
  8. I’d must verify with you here. Which isn’t one thing I often do! I get pleasure from reading a put up that will make individuals think. Pentesting Testing

    ReplyDelete
  9. There are many works on any topic, but I know that there is a essayshark scam, any written work is written there, I became an excellent student and now I go a lot, because I have a lot of free time.

    ReplyDelete

The Open Source Web Hosting company