Securing the Internet of Things

The recent New York Times article on security threats to connected devices, http://nyti.ms/hBLdvY, is a bit of a call to arms for device security.   The article discussed the ease with which a new web-enabled HDTV could be hacked to steal sensitive user profile information.  This example illustrates the lack of awareness among users regarding security threats to their devices including smartphones, TVs, media players and gaming consoles.  In the past, these devices had fragmented operating systems, were not always connected, and carried little sensitive data of high value.  That is all changing rapidly as smartphone penetration and other always-connected devices begin to take on more important functions like banking, health management, and even home/security management.  Also, smart device operating systems are consolidating around several survivors like Android, Apple, and RIM, given hackers more concentrated volumes of users to target.  Companies like Mocana (www.mocana.com) mentioned in the article are working to build in application level security that acts as a watchdog for suspicious activity and prevents to high risk activities from happening on the device without the users knowledge.  

If there is one thing that can prevent 4G and the Internet of Things from transforming the way we live and work, it will be a breakdown in security and trust in wireless networks and devices.  Hopefully, the innovators will stay one step ahead of the hackers.

 
| 0 TrackBacks

Listed below are links to sites that reference Securing the Internet of Things:

Securing the Internet of Things TrackBack URL : http://blog.tmcnet.com/mt/mt-tb.cgi/44295

Around TMCnet:

About this Entry

This page contains a single entry by Scott A. Snyder published on December 27, 2010 7:06 PM.

4G accelerating telepresence to any device? was the previous entry in this blog.

Mobility versus Wireless? What's the Difference? is the next entry in this blog.

Find recent content on the main index or look in the archives to find all content.

Around TMCnet Blogs

Latest Whitepapers

TMCnet Videos