Tag Archives: Internet of Things

Automobiles, (trains,) Planes

What a disaster it would be if all those (self-driving, or augmented-driving as they are today already) cars could be taken over by some madman or unrelatedly hacker … One could remotely steer a car off the road! One could … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven) | Tagged , , , , | Leave a comment

Did / Did Not (Know Who Did)

Anyone still have an overview of where we (?) stand qua attribution of “cyber” attacks [ #ditchcyber, of course ] ..?? Apart from this… There’s so much development in attribution with or without proof, e.g., about hacking elections in some outer … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Sociological, psychological notes | Tagged , , , , , , , , , , , , , , , | Leave a comment

Errors of Your / Machine Learning

Any progress on the front of Machine Learning, i.e., the comparison with how/what humans learn from various teaching formats, and how machines are better at rote learning et al, and how does the perfection of machines learning facts, reflect on … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Privacy | Tagged , , , , , , , , , , | Leave a comment

Retrofitting IoT Security

Pitch before I did the idea that for a while be with us will Legacy IoT be, here. But what about stubbing around it? Developing cheap and easy (necessary since/for backwards compatible, by definition) security solutions that can be plugged … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven) | Tagged , , , , , , , , , , | Leave a comment

WindTalker

Right. So we have a side channel attack where your hand movements over your mobile, when typing in your key, will interfere with WiFi signal patterns in a detectable, traceable way thus revealing your key. Like this (PDF).Would this, on … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven), Privacy | Tagged , , , , , , , , , , , | 1 Comment

The legacy of TDoS

So, we have the first little probes of TDoS attacks (DoS-by-IoT). ‘Refrigereddon’. As if that wasn’t predictable, very much predictable, and predicted. [Edited to add: And analysed correctly, as here.] Predicted it was. What now? Because if we don’t change … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven) | Tagged , , , , , , , , , , , , , | 1 Comment

Teh business, does it exist ..?

On purpose, teh. Plus a spoiler: No. Though this is a tell-tale sign your infosec program, of whatever kind, will #fail, wholesale. ’cause If you can’t specify all stakeholders, at their various levels of detail required, beyond swiping them up … Continue reading

Posted in ERM, GRC, Information Risk Management, Information Security, Innovation (technologicallly driven) | Tagged , , , , , , , , | Leave a comment