How long will it take for Internet of Things Hello Barbie to be hacked?

How long will it take for Internet of Things Hello Barbie to be hacked?

Watch out world, here comes Hello Barbie, an internet-connected smart Barbie. What could possibly go wrong? Network World | Feb 18, 2015 10:47 AM PT  Watch out world, here comes an internet-connected version of Barbie, complete with a wireless connection, microphone, speaker, advanced voice recognition capabilities, and a “customized cloud-based database of her owner’s likes and dislikes” so Barbie can have “real” back and forth conversations with her owner. Hello Barbie is expected to sell for $75 by…

Read More

The Internet of Things Poses a Serious Threat to Privacy and Cyber Security

The Internet of Things Poses a Serious Threat to Privacy and Cyber Security

Where will personal privacy go if 20 billion devices are connected inside you home? Team GoTIoT The Internet of Things poses a serious danger to privacy, writes Hamza Shaban in an article for The Verge. Reporting on the US Federal Trade Commission’s recent report, Shaban worries that the commission’s recommendations do not go far enough to protect consumers. Shaban’s main concern is not usual issue of potential government abuse of new technology, but rather the insidious creeping…

Read More

Privacy Has Gone The Way of the Dinosaur, and That’s Good?

Privacy Has Gone The Way of the Dinosaur, and That’s Good?

Way of the Dinosaur, and That’s Good Pediatrician Charles Goodman vaccinates 1 year- old Cameron Fierro with the measles-mumps-rubella vaccine, or MMR vaccine at his practice in Northridge, Calif., Thursday, Jan. 29, 2015. Some doctors are adamant about not accepting patients who don’t believe in vaccinations, with some saying they don’t want to be responsible for someone’s death from an illness that was preventable. Others warn that refusing treatment to such people will just send…

Read More

The Internet of Things Is Wildly Insecure — And Often Unpatchable

The Internet of Things Is Wildly Insecure — And Often Unpatchable

We’re at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself — as with the Internet of Things. These embedded computers are riddled with vulnerabilities, and there’s no good way to patch them. It’s not unlike what happened in the mid-1990s, when the insecurity of personal computers was reaching crisis levels. Software and operating systems were riddled with security vulnerabilities, and there was no…

Read More

The rise of IoT data and the death of politics

The rise of IoT data and the death of politics

Government by social network? US president Barack Obama with Facebook founder Mark Zuckerberg. The Internet of Things brings big data into the focus. Evgeny Morozov On 24 August 1965 Gloria Placente, a 34-year-old resident of Queens, New York, was driving to Orchard Beach in the Bronx. Clad in shorts and sunglasses, the housewife was looking forward to quiet time at the beach. But the moment she crossed the Willis Avenue bridge in her Chevrolet Corvair,…

Read More

Security Problems with IoT already?

The Half-Baked Security Of Our ‘Internet Of Things’ It is a strange series of events that link two Armenian software engineers; a Shenzen, China-based webcam company; two sets of new parents in the U.S.; and an unknown creep who likes to hack baby monitors to yell obscenities at children. “Wake up, you little slut,” the hacker screamed at the top of his digital lungs last summer when a two-year-old in Houston wouldn’t stir; she happened to…

Read More

There is room for global thinking in IoT data privacy matters

There is room for global thinking in IoT data privacy matters

IoT Privacy in a Global World. By Team GotIoT: As devices become more intelligent and networked, the makers and vendors of those devices gain access to greater amounts of personal data. In the extreme case of the washing machine, the kind of data — who uses cold versus warm water — is of little importance. But when the device collects biophysical information, location data, movement patterns, and other sensitive information, data collectors have both greater…

Read More