Pages

Showing posts with label Mobile Devices. Show all posts
Showing posts with label Mobile Devices. Show all posts

Sunday, February 2, 2014

IoT: Top 5 M2M Key Challenges for 2014 and beyond

The Internet of Things (IoT) is based on the implementation, integration and use of Machine-to-Machine (M2M)Communication powered by the Internet. The philosophy is basic and for the IoT to succeed; the relationship device/machine-internet-end user has to be integrated. The reality however is very different. Major standards development organizations, including the ETSI, agreed on a common M2M service layer, oneM2M, in January 2012 as part of a global initiative to drive M2M standardization, two years down the line, progress has been made but not on the scale hoped for.
Top 5 M2M Key Challenges For 2014 And Beyond
  1. Ecosystem: The ecosystem faces numerous implementation challenges.Existing M2M solutions are highly fragmented and dedicated only to singular applications, as a result it will slow down the development of the Global M2M Market.
  2. Interoperability & Capability: READ MORE

Saturday, February 1, 2014

IoT: The Philosophy of the Net is Dead

"The problem that we now face is that the internet into which IoT is being born is philosophically very different to the internet into which the web was born."
Internet vs. IoT: A Closer Look at Key Philosophies
The Internet of twenty-plus years ago and prior was a place of free love and open standards.Coming from academia where commercial pressures were low,  we moved into the era where internet connectivity onto PCs was the norm --The introduction of Windows 95 -- The way we as a society put the internet to use, has had an uneasy relationship with this "free love", uncommercial philosophy. Think back on how we us get our hands on any type of material ( , studies, music, video etc) for free. In line with the academic philosophy and its influence on the net that information should be freely available for anybody who took an interest in it. For the information producers it was a challenging time as some commercial realism had to be added.
The Internet Of Things (IoT) uses the internet READ MORE

Friday, January 31, 2014

Internet of Things: BotNets exist. ThingBots do not


www.insidedevices.orgOn the 16th of January 2014 Proofpoint (Leading Security Firm) claims to have uncovered what could be the first proven Internet of Things (IoT)-based cyberattack involving conventional household “smart” appliances. The global attack campaign involved more than 750,000 malicious email communications coming from more than 100,000 everyday consumer gadgets such as home-networking routers, connected multi-media centers, televisions and at least one refrigerator (What? A FRIDGE!) that had been compromised and used as a platform to launch attacks.
BotNet or BotThing@insidedevices.orgJust as personal computers can be unknowingly compromised to form robot-like “botnets” that can be used to launch large-scale cyberattacks, Proofpoint’s findings alledge that cyber criminals have begun to commandeer home routers, smart appliances and other components of the Internet of Things and transform them into “thingbots” to carry out the same type of malicious activity. Cyber criminals intent on stealing individual identities and infiltrating enterprise IT systems have found a target-rich environment in these poorly protected internet connected devices that may be more attractive and easier to infect and control than PC, laptops, or tablets.
Does “ThingBot” excist? [----> Read More]

Wednesday, January 29, 2014

The Internet of Things: Top 5 Device Security Tips VISIT

blog courtesy of www.insidedevices.org
Gates’ could control about anything in his house by the tap of his finger, whilst driving his car 20 miles away from his house.
Welcome to the “The Internet of Things“(IoT) that does represent a revolution happening right now. All kind of companies – not just technology and telecommunications firms – are linking “things” as diverse as smartphones, cars and household appliances to industrial-strength sensors, each other and the internet. The technical result may be simple features such as intercommunication and autonomous machine-to-machine (M2M) data transfer, but the potential benefits to lifestyles and businesses are unprecedented.
Ofcourse there is a “But”….with great opportunity comes great responsibility. Along with its conveniences, the IoT will be exposed to unprecedented security challenges: data privacy, safety, governance and trust
What Are The Main Security Loopholes?
Security loopholes can occur anywhere in the IoT; but you can devide into two groups:
www.insidedevices.org
Data Risks: all smart devices will transmit data to a storage point before (in most cases) a bulk upload to the provider, often with outdate security settings.
Privacy Risks: all our smart devices collect, aggregate and transmit our user data,  even tiny items of data in aggregate can identify, define, and label you without your knowledge.
What Can You Do To Protect Your Data and Privacy?
  1. Audit the devices you own.
  2. Secure your device. If a device is connected to your network, it means that it is potentially accessible over the internet.
  3. Verify the security settings on any device you purchase. If it is remotely accessible, disable this feature if it isn’t required
  4. Change any default passwords to something only you know. A long combination of letters, numbers and symbols will generate a strong password.
  5. Check the manufacturer’s website to see if there are updates to the device’s software. If security vulnerabilities are discovered, manufacturers will often patch them in new updates to the software. PATCHING IS EVERYTHING
What Is The Best Example Day-To-Day Example of A Device That Poses A Risk To Our Data and Privacy? 
www.insidedevices.orgThe ATM, whether it is operated from North America, Europe, Africa, South-America, Asia or Australia; the majority is operated on a Windows XP platform. Microsoft announced that by April 8th 2014 it will stop releasing security patches. There are an estimated 3.000.000 ATM’s in the world!
Read the full article here

Sunday, March 24, 2013

Why IPhone will survive the S4, N4, Z10 and others to come


Mcommerce Explorer Blog
With the launch of the Samsung Galaxy S4, HTC One, LG Nexus 4 and Blackberry Z10 a war against Apple's IPhone 5 seems to be declared. But is it really? On the surface it might seem this way, but the real motivation could be seen in a different light. That is what I am going to discuss today.

MCommerce Explorer Blog
A review of recently released smartphones showed that the Samsung Galaxy S4 indeed seems to fullfil its promise followed by HTC One. 
The Blackberry Z10 has a relatively low score, but is basically on par with IPhone 5. 
Interestingly enough the Galaxy S3 marginally outperforms the IPhone 5 and the Z10. 




Does the IPhone have a future?
The IPhone 5 is far from dead. The results published in the review by Primatelabs need to be looked at with a bit of nuance. The IPhone 5 has been on the market since 6 going 7 months, therefore the comparison with the Galaxy S4, HTC One and LG Nexus 4 are not reflecting its actual capabilities.  The S4, One and Nexus 4 all operate on 4 core hardware whilste the 5 is operating on 2 cores (with an operating 2,5 times faster than the IPhone 4S). If you take the release date of the IPhone 5 and benchmark it with phones released in a simular period it suddenly jumps  in ranking to #2 behind the Samsung Galaxy S3. 

What has the Galaxy S4 to offer that the IPhone 5 has not?

Saturday, March 2, 2013

10 Basic Security Steps for Smartphones and Tablets




My previous blog listed the 5 main Mobile security threats for 2013. In this blog I will provide you with 10 basic steps to assure your (new) smartphone or tablets meets the minimum security features. Some of these seem so simple and obvious, that I never paid attention them, makes sense right?! Some of the steps are human behaviour others relate to generic technical knowledge. 



1. Secure it: 
Many of us still don’t secure our devices, by not using a PIN or passcode. Simple, effective and at least it protects you from anyone who gets hold of it to access and use it. 

2. Create a Back Up:
Whether you lose your phone or it gets stolen we all know that it feels like you lost the most important thing in your life. It happened to me in Moscow. I had no backups and felt completely lost! Create a back up!

3. Note Your IMEI: 
IMEI is your unique 15-digit number that identifies your phone. You can find it beneath the battery or alongside a SIM card slot. The number provides Law Enforcement Agencies and sites like EBay.com a way to identify your phone (if it is put up for sale in an auction or brought into a Police station). The number will confirm your ownership! Note it down and store it somewhere safe too you!

4. Security software (Anti-Vius): 
We all know and most of us use Anti-Virus. Additionally such packages offer features like device tracking, remote lock and wipe, anti-phishing protection. Interested? CLICKHERE to go to the 2013 Top 10 Mobile Security Software review. Money well spend!! 

5. Tracking: 
Accurate to a number of metres, modern tracking software is included in the best mobile security offerings, but is also built in to certain mobile platforms. Windows Phone's 'Find My Phone' and iOS' 'Find My iPhone' options should always be activated on devices. It uses tracking software using the phone's built-in data connection. CLICK HERE for the TOP 10 TRACKING Mobile Software. Get Familiar with your phones' capabilities! 

6Verify Your Monthly Phone Bill: 
Make sure you verify your monthly statement, due to certain malware (read my previous blog) that will make use of your device. If you spot it any strange amounts on your statement immediately contact you service provider. It might take you a bit of time, but will save you money!

7. Smart Surfing: 
The most secure data connection you should use on a Mobile Device is provided by your Mobile Provider. Free WIFI-Hot Spots are pose an increased security risk, best is verify if the WIFI-Hotspot provides a secure channel. Be Aware but not affraid!

8. Be Aware of specific threats: 
Especially Andriod operated systems will be targeted in 2013 (as described in my previous blog, boy it gets boring), but if you own a mobile device operating on Windows or Apple's IOS the security risks are more or less the same as with an Android operated Mobile Device!!! Try to follow the latest developments for instance on twitter or via newsletters from your security or mobile provider!

9. Check BYOD Policies
If you use your device at work, over a company network, or for anything related to work, be sure to ask your IT department for any mobile use policies. It might be that your employer requires some control of the work data you have on your device, or may ask you to abide by certain practices. BYOD is basically a two-way relationship: it provides the employee and increased flexibility and mobility which benefits the employer. Verify how it impacts you as a user and how it impacts your employer or employees!

10. Treat your mobile device like you wallet, mind it carefully!
 Don't leave your device unattended whilst going to the bathroom or chatting to somebody at a conference! 

The 10 basic security steps for a new (or already operating) Mobile Device are shockingly easy, but how many of the above boxes can you tick as "Done"?

Link to this post: http://mcommerce-explorer.blogspot.com/2013/03/10-basic-security-steps-for-smartphones.html#links

Friday, March 1, 2013

Top 5 Mobile Security Threats 2013



Today I will expand further on Security threat for specifically mobile devices using Andriod's Operating System.

A quick refresher from my last blog where I discussed the most likely security threats for anybody using a mobile device (Smartphone or Tablet)
- Toll Fraud
- Ransomware
- Bring Your Own Devices (BYOD)
- "Drive-by Exploits"
- Mobile Payments via NFC

TOLL FRAUD:
(SMS Text)  Everybody with a mobile or smartphone receives txt message like "Text 3030 to get your daily weather forecast on your phone" you want it? You text back the number and you receive your daily weather forecast.
This is called PREMIUM SMS as in this figure >>>>>>






Toll Fraud occurs as displayed in the below graph. It is successfull and it happens to more and more users
1A customer downloads an app that sends out an SMS message to that same ringtone provider.
2. The ringtone provider sends the confirmation message, but instead of reaching the smartphone owner, the malware blocks and confirms the text message before the user ever knows.
3. The malware writers further jumps in between the wireless carrier and the ringtone provider, pretending to be an aggregator, and collects the money you just paid through your bill. 


Ransomware:

What is Ransomware? Ransomware traditionally would infect PC's (via a trojan) and demand a ransom to unlock.  For Hackers it is a proven business model on pc's and now has set its sights on Mobile Devices Users. 

Thursday, February 21, 2013

2013 Rising Mobile Security Threats


After my last blog I started to brainstorm about the level and what type of security risks M-Commerce and Social Commerce need to mitigate or assure. Given the rise of sales in Smartphones and Tablets and the immense volume of downloadable applications and increasing volume of apps being developed, (personal) data and the protection of it will be key for any business to succeed. 

In this blog I will provide a bit more background on the type of security issues M-Commerce & M-Users are exposed.
Furthermore I will try to provide some information on who are what creates those threats and what the key drivers are. To finalize a current overview of the business practices and which security gaps need to be closed fast.