Bjarke Gotfredsen

33 Flips | 2 Magazines | 1 Like | 2 Following | @gotfredsen | Keep up with Bjarke Gotfredsen on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Bjarke Gotfredsen”

Securing IoT Devices Requires a Change in Thinking

There's no magic bullet for IoT security, but there are ways to help detect and mitigate problems.

Cybersecurity in an IoT and mobile world: The key trends

As ever more mobile and IoT devices connect to the internet, the potential for damaging cyberattacks can only increase. How can organisations begin …

Security in the Internet of Things

Security issues may represent the greatest obstacle to growth of the Internet of Things. How can semiconductor companies help resolve them?<p><b>Over the</b> …

Internet of Things

Smart TVs, Smart Speakers, Other IoT Devices Remain Vulnerable Post Mirai Botnet

This has truly been a year of ransomware and General Keith Alexander, the former chief of the National Security Agency agrees. In fact, at a …

How to beat security threats to 'internet of things'

The "internet of things" is all about connecting objects to a network and enabling them to collect and share data.<p>Household objects like thermostats, light switches, doorbells, washing machines, fridges and even toys can all be connected via wi-fi and controlled remotely.<p>But how safe are your home …

Boy, 11, hacks cyber-security audience to give lesson on 'weaponisation' of toys

Reuben Paul, 11, tells conference that smart cars, fridges, lights and even teddy bears can be used to spy on or harm people<p>An 11-year-old “cyber ninja” has stunned an audience of security experts by hacking into their Bluetooth devices to manipulate a robotic teddy bear, showing in the process how …

Internet of Things Teddy Bear Leaked 2 Million Parent and Kids Message Recordings

A company that sells “smart” teddy bears leaked 800,000 user account credentials—and then hackers locked it and held it for ransom.<p><b>UPDATE, Feb. 28, 12:25 p.m. ET:</b> After this story was published, a security researcher revealed that the stuffed animals themselves could easily be hacked and turned …

Medical Devices Are the Next Security Nightmare

Hacked medical devices make for scary headlines. Dick Cheney ordered changes to his pacemaker to better protect it from hackers. Johnson & Johnson …

120,000 IoT cameras vulnerable to new Persirai botnet say researchers

Internet connected cameras across the globe are easy to find and hijack to carry out DDoS attacks.<p>A new Internet of Things (IoT) botnet is targeted …

Why the Internet of Things Needs Security Analytics

With the increase of Internet of Things (IoT) devices comes an increased risk of cyberattacks. Last October, a distributed denial of service (DDoS) …

Technical concerns continue to muddle IoT’s long-term promise

A variety of technical issues must be solved soon if the Internet of Things is to evolve as futurists envision, a group of government and commercial …

Securing the future of IoT, no more security through obscurity

<i>The outcry over security compromises involving ‘Internet of Things’ (IoT) devices has led to much hand-wringing over the potential future of the</i> …

The Internet of messy things

<b>How much damage can a ‘smart’ toaster do? Lots, and not just burning your bread.</b><p>In the beginning, devices on the internet were fun. My favorite was …

Security Is A Constantly Moving Target, Isn't It Time To Secure The Hardware?

It shouldn’t come as a surprise that cybersecurity is a different beast than it was 10, or even 5 years ago. While traditional cyber threats such as adware and spam emails are certainly still alive and kicking, the threat surface has grown enormously with the advent of IoT, mobility, BYOD, and the …

Data breaches through wearables put target squarely on IoT in 2017

Forrester predicts that more than 500,000 internet of things (IoT) devices will suffer a compromise in 2017, dwarfing Heartbleed. Drop the mic — …

The Industrial IoT: 125+ Startups Transforming Factory Floors, Oil Fields, And Supply Chains

If you are a startup in the IIoT industry, add or edit your profile directly at the CB Insights Editor to get in front of our research team. With …

How Blockchain Startups Will Solve The Identity Crisis For The Internet Of Things

The popularity of technologies like the self-driving car and Amazon Echo are rising; it’s not hard to imagine a world where your coffee maker knows when to summon your morning Uber to work, and it arrives with groceries and laundry detergent, ordered directly by your refrigerator and washing …

6 Hot Internet of Things (IoT) Security Technologies

Internet of Things (IoT) security breaches have been dominating the headlines lately. WikiLeaks’s trove of CIA documents revealed that internet-connected televisions can be used to secretly record conversations. Trump’s advisor Kellyanne Conway believes that microwave ovens can spy on you—maybe she …

Internet of Things

Maker of smart garage door opener bricks customer’s device in retaliation for negative review

By on April 4, 2017 at 4:42 pm<p>The essential function of a door is to be closed when you want it closed and open when you want it open. Things can get …

Home Automation

The Weaponization of IoT: Rise of the Thingbots

Threat actors use botnets — networks of infected computers or devices — for various cybercriminal purposes, most significantly distributed …

Smart Cities Are Going to Be a Security Nightmare

In the fictional world of the video game <i>Watch Dogs</i>, you can play a hacktivist who takes over the central operating system of a futuristic, hyper-connected Chicago. With control over the city’s security system, you can spy on residents using surveillance cameras, intercept phone calls, and cripple …

The Internet of Things Needs a Code of Ethics

Technology is evolving faster than the legal and moral frameworks needed to manage it.<p>In October, when malware called Mirai took over poorly secured webcams and DVRs, and used them to disrupt internet access across the United States, I wondered who was responsible. Not who actually coded the …

Regulation

Why Do IoT Companies Keep Building Devices with Huge Security Flaws?

Earlier this year an alarming story hit the news: Hackers had taken over the electronic key system at a luxury hotel in Austria, locking guests out of their rooms until the hotel paid a ransom. It was alarming, of course, for the guests and for anyone who ever stays at a hotel. But it came as no …

How to securely deploy medical devices within a healthcare facility

The risks insecure medical devices pose to patient safety are no longer just theoretical, and compromised electronic health records may haunt …