The Internet of Things is already proliferating a number of connected devices into our lives. But as these devices increasingly become abandoned, they turn into security liabilities. The panel discusses the causes, implications, and solutions for IoT Abandonware.
Internet of Things
Dan Goodin at Ars Technica gives an overview of the implications of the recently exposed telnet vulnerability disclosed by WikiLeaks. I’m not surprised the CIA had something like that, however morally dubious I may find it. As an intelligence organization it’s in their interest to have this kind of access. For me, this goes beyond Cisco.
The Internet of Things in a technological hypebeast, being both clearly defined and a marketing ploy at the same time. Cisco has clearly defined what they think IoT is all about: adding connectivity to devices. Using LoRaWAN, Cisco has a compelling technical solution to making connectivity possible on a mass scale.
Nothing like realizing you’re already surrounded by Internet of Things devices while reading about profound insecurity in the still nascent ecosystem!
Chris Lyttle of WiFi Kiwi’s Blog comments: As I lie in bed some nights, I sometimes am awake with a gazillion ideas revolving around in my brain. One of the things that jumped out at me the other night was how online dating was similar to the Internet of Things (IoT). Bear with me a […]
David Meyer of GigaOM comments: The burgeoning internet of things is a great idea but it won’t really take off without some serious breakthroughs in security, said Dan Kaufman, director of the Information Innovation Office at the Defense Advanced Research Projects Agency (DARPA), at our Structure conference in San Francisco on Thursday. Kaufman, who was […]