Internet-of-things vendors beware: The complaint filed by the Federal Trade Commission against router and camera manufacturer D-Link could signal the start of a long-term battle to fix systemic industry problems. D-Link left doors open in its products for hackers through poor security practices, the FTC alleges in a five-count complaint filed in federal court on San Francisco.
The annual Consumer Electronics Show kicked off this week in Las Vegas – the show’s 50th year and bigger than ever. Some 3,800 companies are on hand, more than 100,000 attendees and 2.6 million square feet of exhibit space. Smart devices designed to be connected to the Internet of Things are all the rage again this year.
The Online Trust Alliance (OTA) released its updated IoT Trust Framework at the 2017 Consumer Electronics Show (CES). This new version of the Framework serves as a product development and risk assessment guide for developers, purchasers and retailers of Internet of Things (IoT) devices.
Internet-connected devices should ship with reasonably current software and/or on first boot push automatic updates to address any known critical vulnerabilities, says a new version of an industry recommended list of best practices for lifecycle security of the Internet of Things.
The U.S. Federal Trade Commission announces IoT Home Inspector Challenge, while the Online Trust Alliance aims to improve security with a new version of the IoT Trust Framework. The emerging internet of things (IoT) world is rapidly taking shape and with it have come a host of security related concerns and challenges.
The Online Trust Alliance wants to make it easy for internet of things device-makers to build secure, reliable products. Today at the Consumer Electronics Show in Las Vegas, the group released an update to its IoT Trust Framework, which adds new steps that manufacturers should take to improve privacy, user access management and security alerts.
The Online Trust Alliance (OTA) released its updated IoT Trust Framework. Serving as a product development and risk assessment guide for developers, purchasers and retailers of Internet of things (IoT) devices, the Framework is the foundation for future IoT certification programs. OTA’s goal is to highlight devices and companies that demonstrate a commitment to device lifecycle security and embrace responsible privacy practices.
Sometimes it takes a monumental event for an industry to change. The Target hack during the holiday season of 2013 – in which some 40 million credit card numbers were stolen – changed people's attitudes about security forever. And the same holds true with the attack on DNS provider Dyn last October: Internet of Things (IoT) devices were compromised and turned into bots that slowed access and, in some cases, shut down frequently visited website.
‘Staging” — the process of spiffing up a house to prepare it for sale — usually involves a new coat of paint or some classy-looking rented furniture, but these days a seller hoping to move a property fast for the best possible price might want to consider giving the house a brain transplant. Meanwhile, people who are selling smart homes are beginning to realize they need to hit the reset button on gadgets that might contain passwords and oth
The Internet Society has today released the findings from its 2016 Global Internet Report in which 59 percent of users admit they would likely not do business with a company which had suffered a data breach1.
Co-hosted by the Congressional Cybersecurity Caucus and OTA, please join OTA and industry leaders from Identity Guard, LifeLock, Symantec & Verisign for a briefing on the emerging threat landscape, including breaches, ransomware and business email compromise exploits. Panel will discuss best practices to help prevent these from occurring and how best to respond to an incident.
START With Privacy: will bring together thought leaders in academia, business, government and technology. We will explore in-depth the relationship between privacy and security threats in the digital environment, led by experts in both fields. UW’s Tech Policy Lab is hosting this first-of-its-kind gathering. The conference will also mark the debut of a new tool developed by Washington state: a “Privacy Modeling” application created
Webinar to review highlights of the 2017 Cyber Incident and Breach Readiness Plan. Attend to learn best practices to help protect your data, complete risk assessments and develop an adequate response plan. Download the guide in advance of the webinar at https://otalliance.org/Incident. Speakers to include representatives from Identity Guard, LifeLock, Symantec & Verisign.
RSA Conference 2017 provides the opportunity for all attendees at all levels to grow their knowledge, exchange ideas with peers and further their careers. With opportunity comes great responsibility for the future. Our actions today will have a lasting impact on the strength of the industry—and the safety of the world—tomorrow. Don’t miss out on this amazing opportunity from February 13 to 17 in San Francisco! OTA members get additional $100 off: 1U7OTAFD
We are entering a new era for global insurers, where business interruption claims are no longer confined to a limited geography, but can simultaneously impact seemingly disconnected insureds globally. This creates new forms of systemic risks that could threaten the solvency of major insurers if they do not understand the silent and affirmative cyber risks inherent in their portfolios.
As a participant of NTIA’s multi-stakeholder vulnerability working group and an attendee to this week’s meeting in DC, I was impressed by the level of collaboration and sharing of best practices. Progress is encouraging.
This summer the email marketing industry suffered a setback due to “list bomb” attacks in which thousands of targeted users were unknowingly subscribed to tens of thousands of mailings. In these attacks, ESP infrastructure and highly-reputed brands were used as a means to effectively create a “denial of service” against user inboxes, and email originating from many ESPs and brands was blocked by Spamhaus until the situation was better understood. Could this have been prevented?