Connect with us

Infosecurity

Fixing the Internet of Broken Things: An Open, Hardware-Led Approach

Published

on

Fixing the Internet of Broken Things: An Open, Hardware-Led Approach

Our world is now woven with connected devices. They monitor our health, fly our planes, and drive our cars. Yet, beneath this convenience lies a critical flaw: the security of the Internet of Things is broken. This isn’t a theoretical risk. Vulnerabilities discovered by researchers aren’t just about stolen data; they have the potential for catastrophic, real-world harm.

The Failure of Security-by-Obscurity

For too long, many IoT manufacturers have operated on a dangerous assumption. They believe that hiding their code—security-by-obscurity—is enough. It’s a strategy that has repeatedly failed in the software world. Look at the legacy of proprietary systems like Windows, Java, or Flash. They became prime targets precisely because their closed nature didn’t guarantee safety; it often hid flaws from everyone but the attackers.

The tools available to reverse engineer device firmware are incredibly sophisticated. Malicious actors can extract code directly from hardware or find it in online updates. The idea that obscurity provides protection is a myth that needs to be retired. What’s the alternative? We must embrace openness.

Building on Open Source and Open Standards

Open source software offers a fundamentally different security model. Instead of a handful of developers scrutinizing code, you have thousands of expert eyes worldwide. Flaws are found and fixed with astonishing speed, often within hours. The community’s focus is on quality and utility, not corporate politics or commercial feature sets.

This transparency also addresses another shadowy concern: nation-state interference. History is littered with reports of governments pressuring companies to build secret backdoors into proprietary products. Such concerns rarely, if ever, touch the open-source community at large, where the code is open for all to inspect.

Open standards are equally crucial, especially for networking. Implementing complex protocols like TCP/IP is difficult. When a device engineer, unfamiliar with networking, is tasked with adding connectivity, mistakes are inevitable. Global, interoperable open standards encapsulate this complexity. They allow hardware developers to rely on robust, expert-maintained frameworks, outsourcing the trickiest security work to those who know it best.

Containing Risk with Hardware-Assisted Separation

Many embedded systems are designed as a single, monolithic environment. If a hacker breaches one component—say, the infotainment system in a car—they can often ‘move laterally’ to more critical systems like steering or brakes. This design flaw is a gift to attackers.

The solution is security by separation, enforced by hardware. Using hardware-assisted virtualization, a secure hypervisor can create isolated containers for each software function. The radio runs in one virtual box; the engine management system runs in another. From a risk perspective, assuming any software can be compromised is prudent. This architecture ensures that a breach in one container is contained, preventing it from becoming a stepping stone to the entire system.

Of course, systems need to communicate. The volume might need to increase as the car accelerates. This is managed through strictly controlled, secure channels between containers. This model isn’t just for safety; it’s essential for business. A smart TV without this separation could allow a rogue app to steal a protected video stream from Netflix, causing significant financial damage.

The Practical Path Forward

The ideal of a hardware-rooted, open security framework is the destination. Reaching it requires a journey. Not all chips today support advanced virtualization. However, progress can start now.

Manufacturers can begin with intermediate steps like Linux containers to isolate applications. Even without a dedicated ‘root of trust’ chip, firms can and must encrypt and cryptographically sign their firmware. They must commit to providing timely security patches. Waiting for perfect hardware is not an option when the vulnerabilities are present today.

The stakes couldn’t be higher. We built an internet of things without a foundation of security. To fix it, we must collectively move away from secrecy and toward openness, and away from monolithic designs and toward hardware-enforced separation. The journey is necessary, and it starts with a decision to change our approach.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Infosecurity

Visual Hacking: The Alarming Office Threat You Can See

Published

on

The Invisible Threat in Plain Sight

Imagine a stranger walking into your office, grabbing confidential documents from a desk, and photographing a colleague’s computer screen. No malware, no phishing email—just a pair of eyes and a smartphone. This is visual hacking, a physical security risk that often flies under the radar. While security teams focus on digital threats, a simple walkthrough can yield a treasure trove of sensitive data.

A revealing experiment by the Ponemon Institute put this theory to the test. A ‘white hat’ penetration tester entered eight U.S. companies posing as a temporary worker. His mission was straightforward: see what information he could gather just by looking around. The results were startling. A full 88% of his visual hacking attempts were successful.

How a Visual Hacker Operates

The tester’s methods were brazenly simple. He didn’t skulk in shadows; he operated in full view of other employees. His approach followed a three-step process anyone could replicate. First, he casually walked through open-plan offices, scanning desks and monitors for exposed information. Next, he picked up stacks of papers boldly labelled ‘Confidential.’ Finally, he used his smartphone’s camera to snap pictures of anything valuable left on screens.

Did anyone stop him? Occasionally. But he was only challenged 30% of the time. Even when questioned, he had already collected nearly three pieces of company data on average before being asked to leave. The barrier to entry for this type of espionage is shockingly low.

The Shocking Speed and Scale of Exposure

How long does it take to compromise an office’s visual security? Not long at all. The study found that 45% of successful hacks were completed in under 15 minutes. Nearly two-thirds were done in half an hour. A determined individual could visit multiple floors or departments in a single morning.

The volume of information stolen was equally concerning. Per office visit, the tester collected an average of five sensitive items. What was he taking? Employee contact lists were the most common prize, found in 63% of hacks. Customer information followed at 42%. Corporate financial data, employee login credentials, and private employee details were each nabbed 37% of the time. One visual hack can provide multiple keys to the kingdom.

Where is all this data found? Look at the screens around you. Over half (53%) of the compromised information came directly from computer monitors. Vacant desks accounted for 29%, while printers, copiers, and even waste bins made up the remaining 18%. Your biggest vulnerability might be the glowing rectangle on your desk.

Who is Most at Risk?

You might assume remote workers in coffee shops are the primary targets. They are vulnerable, but the study highlights that complacency in the corporate office is a major problem. Open-plan environments, where contractors and visitors blend in, are particularly fertile ground for visual hackers.

Certain departments are more exposed than others. The research identified customer service roles as the easiest to hack. Legal and finance teams, perhaps more conditioned to handling sensitive data, were more risk-averse and secure. This suggests a company’s security culture is not uniformly applied.

Simple, Effective Defenses

The good news? Visual hacking is one of the easier security risks to mitigate. The study showed a clear drop in successful hacks at companies that implemented basic protective measures. What works?

Mandatory security awareness training is crucial. Employees need to understand the threat. A strict clean-desk policy ensures nothing sensitive is left out overnight. Formal processes for document shredding and reporting suspicious activity create a culture of vigilance.

One of the most effective technical tools is also one of the simplest: privacy filters. These thin screens, which can be fitted to monitors and laptops, narrow the viewing angle. Data on the screen becomes unreadable to anyone not sitting directly in front of it. They are a physical barrier against prying eyes.

A hacker often needs just one piece of information to trigger a major breach. This study exposes how easily that piece can be obtained without touching a keyboard. The threat isn’t just in the code; it’s in the casual glance across the room. Protecting your data means protecting what’s visible.

Continue Reading

Infosecurity

Teenage Hackers: From Digital Rampage to Cybersecurity Careers

Published

on

From Bus Stops to Firewalls: The Modern Teenage Rebellion

Remember being a teenager? The world felt like it was against you. There was angst, sullen silence, and a burning desire to push boundaries. For previous generations, that energy might have been directed at a bus stop or a phone box. The targets have simply evolved.

Today’s rebellion is digital. The recent TalkTalk breach, with arrests involving teenagers, is a stark reminder. When police arrest a teen for a cybercrime just a ten-minute train ride from your office, it makes you think. Is hacking the new vandalism?

We’re not dealing with the same bored youth of the 1980s. These are total digital natives. For them, logging on is as instinctive as breathing. The street corner has been replaced by the server room. The negative energy that once fueled petty vandalism now finds an outlet in probing security systems.

But what if that energy could be harnessed? What if the very skills used to breach systems could be the solution to defending them?

Turning Trouble into Talent: The Cybersecurity Challenge

The security industry faces a critical skills shortage. Ironically, a potential pool of talent might be found in the same demographic causing some of the headaches. The key is redirection.

Organizations like Cyber Security Challenge UK are pioneering this approach. They don’t see teenage hackers as just a problem. They see untapped potential. Their strategy is simple: channel that curiosity and competitive spirit into constructive, legal challenges.

Take their Masterclass Grand Final. It’s not a dry exam. It’s a high-stakes simulation that feels ripped from a spy thriller. Competing teams, many containing teens, are tasked with preventing a simulated bio-terror attack on the Royal Family. Their mission? Hack into and take control of a building’s ventilation system to stop a deadly pathogen.

This is serious play. Participants use real digital forensic techniques and must operate within strict legal frameworks monitored by experts from GCHQ. They get hands-on with the same tools and protocols used by national defense agencies. It’s a crash course in ethical cyber warfare.

The New Recruitment Ground: From Gaming to Guarding

Nigel Harrison of Cyber Security Challenge UK, a man with a military background, understands this new landscape. He views cybersecurity as a modern theater of war. The frontline is digital, and the soldiers need a particular mindset.

The industry is realizing that traditional recruitment paths aren’t enough. Gaming and competitive challenges are becoming vital talent pipelines. These formats speak the language of a generation raised online. They test problem-solving under pressure, creativity, and technical prowess in a way a standard interview never could.

It’s about inspiration. The goal is to show young people with a knack for code that there’s a legitimate, exciting, and well-paid career in using those skills for good. The thrill of the hack doesn’t have to lead to a police caution. It can lead to a job offer.

Beyond the Handcuffs: A Golden Opportunity

We shouldn’t be shocked when teenagers are implicated in high-profile breaches. Their environment is digital, and testing its limits is a form of exploration. The question isn’t just about punishment; it’s about opportunity.

The security industry has a choice. It can view every teen with coding skills as a threat. Or, it can see a generation of digital natives who, with the right guidance, could become our best defenders.

That teenage desire to stay online, to understand systems, to beat a challenge—it’s a powerful force. It’s the same drive that once organized a parent-free party via Facebook or drew on a fencing uniform. The impulse is human. The outlet has changed.

The ultimate aim should be to make the only handcuffs involved the golden ones of a signing bonus. By creating compelling, ethical avenues for their talents, we can turn a digital rampage into a rewarding career. The next generation isn’t just breaking systems; they could be the ones building stronger ones.

Continue Reading

Infosecurity

Cyber Insecurity Haunts Our Digital Future This Halloween

Published

on

Cyber Insecurity Haunts Our Digital Future This Halloween

Law enforcement warnings about cyber threats to our interconnected world feel like old news. We’ve heard them before. But the real scare comes when you mix that familiar warning with another prediction: by 2020, roughly 50 billion devices will be connected online, serving a global population of 7.6 billion.

Our commercial and social lives are already funneled through keyboards and screens. That trajectory isn’t slowing down. The ‘online or the highway’ mantra is becoming our reality.

A History of Underestimating the Threat

What’s truly frightening is how long the guardians of our infrastructure underestimated the danger. I recall a conversation at an Infosecurity event around 2006. I expressed concern about the growing cyber threat to a member of the Centre for the Protection of National Infrastructure (CPNI).

The response was dismissive. The threat was overhyped, they said. The risks were being exaggerated.

That complacency set the stage for where we are today. For decades, we moved steadily away from isolated, hardware-protected systems. The old, ‘unfriendly’ mainframes from IBM and Tandem had their own kind of security through obscurity and complexity.

The Allure of Cheap and Cheerful Tech

Then came the bright idea of the client-server age. Coupled with Commercial Off-The-Shelf (COTS) software, it promised a new dawn. Businesses saw a path to massive cost savings, leaving expensive, proprietary systems behind.

We made life easier for users. We gave them floppy disks, local functionality, and personal computers designed for productivity and enjoyment. The focus was on access and convenience, often at the expense of security.

Even when some experts questioned this ‘Big Bang’ approach, the march continued. The industry charged down the Yellow Brick Road of technology, chasing ever-lower costs. The final nail in the coffin for many organizations? The disastrous embrace of Bring Your Own Device (BYOD) policies, which completed a perfect circle of insecurity.

Welcome to the World of Cyber Insecurity

This Halloween, we stand before a gate. A single sign hangs on the crossbar: ‘Welcome to the world of cyber insecurity.’ The subtext reads, ‘You got it wrong. Time to think again.’

The TalkTalk breach and the arrest of a 15-year-old suspect should give us all pause. Are we dealing with master criminals, or just opportunistic ‘ghoul’s little helpers’ taking advantage of gaping vulnerabilities? The distinction matters less when the damage is done.

This isn’t about jumping on a bandwagon. It’s a simple, urgent observation: things are not going well in the world of technology security. We need to step back. We must try to put the genie back in the bottle, even if it fights us every step of the way. Ignoring the problem won’t make the digital ghosts disappear.

Continue Reading

Trending