IoT Magazine

By Michael Reuter | A curated collection of articles about the IoT, M2M, Wearables and the Quantified Self by the founders of @Datarella

Can machine learning AI protect critical infrastructure from cyber-attacks?

Moreno Carullo examines how machine learning and AI can be deployed to protect physical infrastructures from cyber-attack.<p>ICS (Industrial Control …

South African telco signs deal with a local church to sell phones to its 7 million members

Vodacom South Africa has announced a partnership with the Shembe church to distribute the telecommunications company’s products and services to the church’s members.<p>The “mutually beneficial relationship,” as Vodacom announced, was signed between Vodacom and the Shembe Family Trust which handles the …

Africa

Brickerbot Developer Claims he Bricked Over 2 Million IoT Devices so far

<b>Not too long ago, we talked on this site about Brickerbot, a new type of malware targeting Internet of Things devices. Although it was a bit unclear</b> …

How P&G and American Express Are Approaching AI

There is a tendency with any new technology to believe that it requires new management approaches, new organizational structures, and entirely new personnel. That impression is widespread with cognitive technologies — which comprises a range of approaches in artificial intelligence (AI), machine …

Machine Learning

Stealing sensitive browser data with the W3C Ambient Light Sensor API

19 Apr 2017 on w3c | privacy | web browser | firefox | privacy engineering | chrome | sensors | light sensor<p>In this post we describe and demonstrate …

Web Development

Mercedes-Benz is connecting the Amazon Echo and Google Home to all its new cars

‘Ok Google, stop my house from burning down’<p>Mercedes-Benz announced today that all of its 2016 and 2017 vehicles in the US can now connect with both Amazon and Google’s digital voice assistants.<p>Starting today, Mercedes owners can instruct their Google Home or Amazon Echo to remotely start or lock …

Amazon Echo

Machine learning algorithms surpass doctors at predicting heart attacks

Why it matters to you<p>Between 15 and 20 million people die every year from heart attacks and related illnesses worldwide, but now, artificial …

Machine Learning

Stories From Two Years in an IoT Honeypot

SINT MAARTEN—Curious just how susceptible some of the more vulnerable IoT devices are, a researcher set up a series of honeypots at his friends’ …

Information Security

Counsel of protection: The coming revolution in insurance

Counsel of protectionThe coming revolution in insurance<p>Technological change and competition disrupt a complacent industry<p>print-edition iconPrint …

Insurance

Apple Will Dominate Mobile Contactless Payments, Analysts Claim

That’s the news, and while it confirms what I have been saying for some time it’s still good to see analysts at Juniper Research reach the same …

FDA clears Bluetooth BP monitor, 7-day wearable ECG, and two other digital health products

Chinese medical supply company <b>Shenzen-Kingyield</b> has received FDA 510(k) clearance for a Bluetooth-connected blood pressure monitor. The device is …

Digital Health

Microsoft Buys Deis to Add Container Muscle to Azure

Microsoft made another play yesterday to improve what Scott Guthrie, EVP for Microsoft's cloud and enterprise group, describes as its “new cloud …

Cloud Computing

Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-Air

Millions of smartphones and smart gadgets, including Apple iOS and many Android handsets from various manufacturers, equipped with Broadcom Wifi …

Acoustic Attack Against Accelerometers

Interesting acoustic attack against the MEMS accelerometers in devices like FitBits.<p>Millions of accelerometers reside inside smartphones, …

Cybersecurity

Indie smartwatches are doomed as long as Apple and Google have control

The Dagadam Watch is the latest Kickstarter to fail to learn Pebble’s lesson<p>Smartwatches are having a rough time. No matter what your chosen platform, sales are mostly down, hardware is mostly bulky, software is mostly slow, and battery life is mostly poor. The industry in general seems to be …

Wearable Tech

Dishwasher has directory traversal bug

Don't say you weren't warned: Miele went full Internet-of-Things with a dishwasher, gave it a web server and now finds itself on the wrong end of a …

Information Security

Qtum Reveals “Go-Mobile” Strategy for Smart Contracts and IoT

Bitcoin

Researchers devise efficient power converter for internet of things

The “internet of things” is the idea that vehicles, appliances, civil structures, manufacturing equipment, and even livestock will soon have sensors …

Arduino

‘Artificial Intelligence’ Has Become Meaningless

It’s often just a fancy name for a computer program.<p>In science fiction, the promise or threat of artificial intelligence is tied to humans’ relationship to conscious machines. Whether it’s Terminators or Cylons or servants like the “Star Trek” computer or the <i>Star Wars</i> droids, machines warrant the …

What African elephants with Fitbits teach us about why and when we sleep

Wild African elephants may not care about their step counts, but scientists who fitted two elephants with “fitbits” believe the results could change our understanding of sleep.<p>Most mammals sleep. But the purpose of this period of inactivity and vulnerability still baffles scientists. Big animals – …

The future of the car is charging it overnight and buying it a data plan

Not only will your car soon be telling you it’s low on battery, you may have to top up its data, too.<p>US carmaker Chevrolet yesterday began offering an unlimited 4G plan for $20 per month. That fee will allow car owners and passengers to connect to the internet through an AT&T OnStar 4G LTE Wi-Fi …

Medical Devices Are the Next Security Nightmare

Hacked medical devices make for scary headlines. Dick Cheney ordered changes to his pacemaker to better protect it from hackers. Johnson & Johnson …

Cybersecurity

Internet of Things Teddy Bear Leaked 2 Million Parent and Kids Message Recordings - Motherboard

<b>UPDATE, Feb. 28, 12:25 p.m. ET:</b> After this story was published, a security researcher revealed that the stuffed animals themselves could easily be hacked and turned into spy devices.<p>A company that sells internet-connected teddy bears that allow kids and their far-away parents to exchange heartfelt …

Security

Comparison: Nokia 3310 vs Lava Connect M1 vs Swipe Konnect Star

​Nokia 'launches' 5 new phones: All you need to know<p>Nokia is back with a bang. The company made a splash with a slew of launches at Mobile World …

Barely 1% of Android users are running Nougat, as Apple shows how...

What are the most commonly over-looked piece of professional security advice amongst computer users?<p>If you answered install security patches, use …

Medical app Achu uses fitbit data to predict if you’re getting sick

It’s cold and flu season. That means trying not to touch doorknobs, upping your vitamin game, and avoiding your coworker who, for some reason, …

Wearable Tech

3D-printed phone attachment could help identify TB and Ebola

The device attaches to a phone and can analyse DNA and cell mutations<p>A mobile phone 'case' has been used to detect cancer-related mutations in DNA …

Genetics

Is Apple's iPhone going to get wireless charging?

The tech giant offers the electrifying news that it's joined a wireless charging standards group.<p>If you've been holding out hope for wireless charging to come to the iPhone, chew on this: Apple joined the Wireless Power Consortium, the company confirmed Monday.<p>Apple declined to comment on future …

iPhone

Hotel ransomed by hackers as guests locked in rooms

Furious hotel managers at the Romantik Seehotel Jaegerwirt, a luxurious 4-star hotel with a beautiful lakeside setting on the Alpine Turracher Hoehe …