Chinese IoT Firm Siphoned Text Messages, Call Records

A Chinese technology firm has been siphoning text messages and call records from cheap Android-based mobile smart phones and secretly sending the data to servers in China, researchers revealed this week. The revelations came the same day the White House and the U.S. Department of Homeland Security issued sweeping guidelines aimed at building security into Internet-connected devices, and just hours before a key congressional panel sought recommendations from industry in regulating basic security standards for so-called “Internet of Things” devices. Continue reading Chinese IoT Firm Siphoned Text Messages, Call Records

Congress To Security Experts: How Do We Deal With The Internet of Shit?

And Bruce Schneier thinks regulating the Internet of Things is inevitable and desirable. Continue reading Congress To Security Experts: How Do We Deal With The Internet of Shit?

Regulation May Be Best Answer to IoT Insecurity

Technologists, including Bruce Schneier, testifying before a House committee today on IoT security said that regulation could be the only answer to solving existing vulnerabilities. Continue reading Regulation May Be Best Answer to IoT Insecurity

Europe to Push New Security Rules Amid IoT Mess

The European Commission is drafting new cybersecurity requirements to beef up security around so-called Internet of Things (IoT) devices such as Web-connected security cameras, routers and digital video recorders (DVRs). News of the expected proposal comes as security firms are warning that a great many IoT devices are equipped with little or no security protections. Continue reading Europe to Push New Security Rules Amid IoT Mess

Bruce Schneier on Probing Attacks Testing Core Internet Infrastructure

Bruce Schneier talks to Mike Mimoso about information he was given regarding an increase in DDoS and probing attacks targeting companies running core internet infrastructure in an attempt to test their defenses. Continue reading Bruce Schneier on Probing Attacks Testing Core Internet Infrastructure

The Internet of Things Will Turn Large-Scale Hacks into Real World Disasters

The rise of the Internet of Things threatens to make it much easier to cause real-life damage through cyberattacks. Continue reading The Internet of Things Will Turn Large-Scale Hacks into Real World Disasters

Bruce Schneier on the Integration of Privacy and Security

Threatpost Editor in Chief Mike Mimoso talks to crypto pioneer and security expert Bruce Schneier of Resilient Systems about the early days of the RSA Conference, the integration of privacy and security, and the current FBI-Apple debate over encryption… Continue reading Bruce Schneier on the Integration of Privacy and Security

Apple Hackers, Crypto Experts Ask Courts to Vacate Order

An amicus brief filed on behalf of well known past and present Apple hackers asks the government to vacate its order asking Apple to unlock a terrorist’s phone. Continue reading Apple Hackers, Crypto Experts Ask Courts to Vacate Order

The Lowdown on the Apple-FBI Showdown

Many readers have asked for a primer summarizing the privacy and security issues at stake in the the dispute between Apple and the U.S. Justice Department, which last week convinced a judge in California to order Apple to unlock an iPhone used by one of assailants in the recent San Bernardino massacres. I don’t have much original reporting to contribute on this important debate, but I’m visiting it here because it’s a complex topic that deserves the broadest possible public scrutiny. Continue reading The Lowdown on the Apple-FBI Showdown