Archive for February 21st, 2014

“The cloud” is a very high-profile buzzword these days. As a professional developer and blogger, I read about the fabulous advantages of the cloud every day, at least if I’m to believe all the announcements and commercial emails I get to read. As a private person I see more and more applications move from the “personal computer” to “the cloud”.

It shouldn’t surprise us then that criminals are also turning to the cloud: they do not just run their tools on hijacked computers all over the world, but they’re also targeting cloud applications to try to steal data and/or money from you. The Mt.Gox disaster that crashed the value of the Bitcoin a week ago is an obvious example, and so are the thefts of user data on too many web sites (KickStarter being the latest big name in the list of victims). Worse things are happening though: we are slowly moving into world where smart appliances are getting connected to the Internet, and those appliances are easy targets for malicious hackers!

Word cloud based on Bruce Schneier's opinion of TIoT

Word cloud based on Bruce Schneier’s opinion of TIoT

Bugs in mobile phone software are a well-known phenomenon, but lately I have seen many alerts for exploits that target appliances like internet routers (Linksys, Cisco), home automation appliances (Belkin WeMo, TV’s and webcams) and even baby monitors).

There are no definitive answers to the question “How can we make sure that the Internet of Things (TIoT) will remain secure?“. In the mean time, it won’t hurt to learn a bit more about networking and routers: making sure that only authorised network traffic enters your home is a good start! And read an expert’s opinion on the subject: “The Internet of Things Is Wildly Insecure—And Often Unpatchable. By Bruce Schneier“.

Oh, and don’t be surprised today if your computer proposes an update of the Flash Player: “Adobe releases emergency Flash update amid new zero-day drive-by attacks“…


Read Full Post »