IoT Security Blog

Articles and Posts on IoT Security, Embedded Systems, and the Internet of Things

Hacks

RFID Security Alliance Open Forum-6/8/2011-Cyberwarfare & RFID

Contributed by Joanne C. Kelleher The RFID Security Alliance holds a monthly open forum about topics related to securing radio frequency identification systems. Attendees can dial in or, if in the San Francisco, CA area, attend in person. June’s topic is Cyberwarfare and RFID Featured speaker: Lukas Grunwald, CEO of DN-Systems Enterprise Internet Solutions GmbH…

Read More

RFID Pickpockets Capture Credit Card Data

Contributed by Joanne C. Kelleher I have been meaning to write about data skimming off of RFID enabled credit cards. This topic has been covered on local TV stations across the country over the last several months. Almost all of the stories include a demo by the founder and CEO of a firm that makes…

Read More

RFID Security Predictions for 2011

Contributed by Joanne C. Kelleher As we are approaching the end of the year, predictions for 2011 are being released. This year I spotted two specific to RFID security. VDC Research Group, in their Top 5 Trends for the RFID Solutions Market in 2011 predicts that authentication and anti-counterfeiting will emerge as leading applications. “Product authentication…

Read More

A Vote for Securing the Social Network of Devices a Safer Smart Grid

Contributed by Joanne C. Kelleher GE’s Ecomagination Challenge is a $200 million call to action for businesses, entrepreneurs, innovators, and students to share their best ideas and come together to take on one of the world’s toughest challenges building the next-generation power grid to meet the needs of the 21st century. SecureRF has submitted an…

Read More

Lack of Security in Smart-Meter Rollouts

Contributed by Joanne C. Kelleher Smart Grid security covers a wide spectrum of technologies from fences and video cameras at the power generation facilities and substations to securing the data in the embedded systems and metering devices used to monitor and adjust a homeowner’s usage. These Smart Meter security issues have been in the news a lot recently. Elinor…

Read More

Interest in Academic Papers about Attacks Varies

Contributed by Joanne C. Kelleher On March 20th, The New York Times covered a story of how a graduate engineering student in China, Wang Jianwei, had been described as a potential cyberwarrior before the United States Congress. Mr. Wang said he and his professor had indeed published Cascade-Based Attack Vulnerability on the U.S. Power Grid in…

Read More

RFID Hacking Talks at CCC and RFIDSA

Contributed by Joanne C. Kelleher Karsten Nohl, the researcher and hacker who almost two years ago declared that Mifare was insecure, will be speaking at the January RFID Security Alliance meeting and recently made two presentations at the 26th Chaos Communication Congress (CCC) conference – http://events.ccc.de/congress/2009/Fahrplan/speakers/1317.en.html . These CCC presentations have received some widespread press.…

Read More

This Is Always the Year for RFID Security

Contributed by Joanne C. Kelleher Bert Moore, Editor of AIM Global’s RFID Connections newsletter, asked in today’s issue Will this be the year that RFID security is finally implemented? With the long lead time to get to a full project implementation, we think that Bert’s thesis is correct although the time frames may still continue…

Read More

As Seen on The Connecticut Innovations Blog

Louis M. Parks, CEO of SecureRF Corporation, contributed a posting to The Connecticut Innovations Blog which appears today. Louis talks about the convergence of three trends: Aging security and cryptographic technologies The movement toward smaller computer platforms which may not be able to run these technologies The increase in computing power to attack and hack these systems…

Read More

Current trends in cyber attacks on mobile and embedded systems

Contributed by Joanne C. Kelleher The latest issue of Embedded Computing Devices (September 2009) has an article called Current trends in cyber attacks on mobile and embedded systems. Now, with the advent of what some technologists call the Internet of things, we are encountering a new wave of hacking, one that encompasses not only wired…

Read More