Tag Archive for Internet of Things

Web Connected Television New Source of Threats

Web Connected Television New Source of ThreatsYou may want to consider the security of the fancy new 55-inch high-def LCD Television that Santa Claus brings you. Surprise, surprise, surprise they may have security holes that could allow hackers to take over your home network. Consumer appetite for on-demand and online video content will drive sales of Internet-connectable TV devices to nearly 350 million units worldwide by 2015 reports ITnewsLink.

Parks AssociatesConnected Living Room: Web-enabled TVs and Blu-ray Players forecasts worldwide sales of Internet-connectable HDTVs, Blu-ray players, game consoles, and digital video players like Apple‘s (AAPL) Apple TV will grow about fourfold from 2010.

Parks Associates says all major manufacturers are debuting new models with innovations in content aggregation, apps development, and user interfaces. Content options are finally catching up to the hardware innovations, and growing libraries of on-demand movies and TV available are starting to unlock the potential of connected TV devices as multifunction online entertainment and communications platforms.

The growth of these devices will increase opportunities for apps developers – including third-party developers and giants such as Google (GOOG), Samsung, and Yahoo (YHOO), and one other group, hackers.

Mocana logo Mocana, a company that focuses on securing the “Internet of Things”, released a study that highlights digital security flaws in Internet-connected HDTVs reports ITnewsLink. The Mocana researchers believe that the security flaws exist in many Internet TVs and recommend that consumers seek out third-party security tests before they purchase and install them in their homes.

Mocana’s CEO Adrian Turner told ITnewsLink: “…manufacturers are rushing Internet-connected consumer electronics to market without bothering to secure them … consumer electronics companies that might lack internal security expertise should seek it out, before connecting their portfolio of consumer devices to the Internet.”

Computer securityMocana’s research shows that attackers may be able to leverage Internet-connected TVs to hack into consumers’ home networks. Researchers found that the Internet interface failed to confirm script integrity before those scripts were run. Mocana was able to show that JavaScript could then be injected into the normal data stream, allowing attackers to obtain total control over the device’s Internet functionality. As a result, an attacker could intercept transmissions from the television to the network using common “rogue DNS”, “rogue DHCP server”, or TCP session hijacking techniques. The security holes could allow attackers to:

  • Present fake credit card forms to fool consumers into giving up their private information.
  • Create a man-in-the-middle attack on the HDTV to dupe consumers into thinking that “imposter” banking and commerce websites were legitimate.
  • Steal the TV manufacturer’s digital “corporate credentials” to gain special VIP access to backend services from third-party organizations including popular search engines, video streaming, and photo sharing sites.
  • Monitor and report on consumers’ private Internet usage habits without their knowledge.

The flaws Mocana uncovered should raise questions about the security of consumer electronics in general-which manufacturers are scrambling to connect to the Internet, often with little or no security technology on board.

Alfred E. NewmanMocana’s CEO Adrian Turner continued: “While much public discussion … on the recent explosion of smartphones … the vast majority of new devices coming onto the Internet aren’t phones at all: they are devices like television sets, industrial machines, medical devices, and automobiles – devices representing every conceivable industry. And the one thing that all these manufacturers have in common is that, unlike the computing industry, they don’t have deep experience in security technology.”

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Gartner’s Top Tech Trends For 2012

GartGartner's Top Tech Trends For 2012ner VP David Cearley described their top ten strategic technology trends for 2012 to attendees of the Gartner Symposium IT/Expo. Gartner (IT) defines a strategic technology as one with the potential for significant impact on the enterprise in the next three years. Here are Gartner’s top strategic technologies for 2012.

Gartner logoMedia tablets and beyond: Bring-your-own-technology (BYOT) at work has become the norm, not the exception.  By 2015 tablet shipments will reach around 50% of laptop shipments and Windows 8 will likely be in third place behind Google‘s (GOOG) Android and Apple’s (AAPL) iOS. The net result is that Microsoft‘s (MSFT) share of the client platform, be it PC, tablet, or smartphone, will likely be reduced to 60% and it could fall below 50%, Mr. Cearley says.

Apple iPadThe implication for IT is that the era of PC dominance with Windows as the single platform will be replaced with a post-PC era where Windows is one of a variety of environments IT will need to support. Gartner says it expects iOS/Android will dominate the market with 80% of tablets shipped by 2015. IT leaders need a managed diversity program to address multiple form factors, as well as employees bringing their own smartphones and tablet devices into the workplace.

Mobile-Centric Applications and Interfaces. User interfaces with windows, icons, menus and pointers which have been in place for more than 20 years are changing. The UI will be replaced by mobile-centric interfaces emphasizing touch, gesture, search, voice, and video. Applications themselves are likely to shift to more focused and simple apps that can be assembled into more complex solutions. By 2015 half the applications that would be written as native apps in 2011 will instead be delivered as Web apps.

The Internet of Things (IoT)Internet of Things: The Internet of Things (IoT) describes pervasive computing where cameras, sensors, microphones, image recognition, everything, is now part of the environment. In addition, increasingly intelligent devices create issues such as privacy concerns. Gartner says. Drivers of the IoT are:

  • Near Field Communication (NFC) payments allows users to make payments by waving their mobile phone in front of a compatible reader.
  • Embedded sensors which detect and communicate changes are being built into an increasing number of places and objects.
  • Image Recognition technologies identify objects, people, buildings, places logos, etc. that has value to consumers and enterprises.

App Stores and MarketplacesApp Stores and Marketplaces: Application stores by Apple and Android provide marketplaces where hundreds of thousands of applications are available to mobile users. Gartner forecasts that by 2014, there will be more than 70 billion mobile application downloads from app stores every year with an enterprise focus. With enterprise app stores, the role of IT shifts from that of a centralized planner to a market manager providing governance and brokerage services to users and potentially an ecosystem to support entrepreneurs. Enterprises should use a managed diversity approach to focus on app store efforts and segment apps by risk and value.

Big DataBig Data: The size, complexity of formats, and speed of delivery exceed the capabilities of traditional data management technologies; Gartner says it requires the use of new technologies simply to manage the volume alone. One major implication of big data is that in the future users will not be able to put all useful information into a single data warehouse. Logical data warehouses bringing together information from multiple sources as needed will replace the single data warehouse model.

Cloud Computing: This topic is still an important trend. It will become the next-generation battleground for the likes of Google and Amazon (AMZN). Going forward, enterprise IT will be concerned with developing hybrid private/public cloud apps, improving security and governance, Mr. Cearley says. While the market remains in its early stages in 2011 and 2012, it will see the full range of large enterprise providers fully engaged in delivering a range of offerings to build cloud environments and deliver cloud services. Oracle (ORCL), IBM (IBM), and SAP (SAP) all have major initiatives to deliver a broader range of cloud services over the next two years. As Microsoft continues to expand its cloud offering, and these traditional enterprise players expand offerings, users will see competition heat up and enterprise-level cloud services increase.

Cloud ComputingEnterprises are moving from trying to understand the cloud to making decisions on selected workloads to implement on cloud services and where they need to build out private clouds. Hybrid cloud computing which brings together external public cloud services and internal private cloud services, as well as the capabilities to secure, manage and govern the entire cloud spectrum will be a major focus for 2012. From a security perspective, new certification programs will be ready for the initial trial, setting the stage for more secure cloud computing. On the private cloud front, IT will be challenged to bring operations and development groups closer together using “DevOps” concepts in order to approach the speed and efficiencies of public cloud service providers.

Other key predictions Gartner had included:

  • Contextual and Social User Experience: Context-aware computing uses information about an end-user to improve the quality of interaction and anticipates the user’s needs and proactively serves up the customized content. By 2015, 40% of the world’s smartphone users will opt in to context service providers that track their activities with Google, Microsoft, Nokia (NOK), and Apple continuously tracking daily activities Mr.Cearley says.
  • The growing use of flash memory for In-Memory Computing is a long-term technology trend that could have a disruptive impact comparable to that of cloud computing.
  • The adoption of Extreme Low-Energy Servers built on low-power processors typically used in mobile devices will increase for non-compute intensive workloads or delivery of static objects to a website. Gartner says that 10%-15% of enterprise workloads are good for this.
  • Next-Generation Analytics Gartner says over the next three years, analytics will mature from structured and simple data analyzed by individuals to the analysis of complex information of many types (text, video, etc.) from many systems.
Related articles
  • Expecting a recession, Gartner urges ‘creative destruction’ (networkworld.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Medicine Talks M2M

Medicine Talk M2MDon’t worry about Big Brother, it’s Big Pharma that gets the latest award for invading your space. Dailywireless.org reports that drugmaker Pfizer (PFE) wants to boost the profitability of its cholesterol-lowering Lipitor by calling you to nag remind you to take your medicine. According to Dailywireless.org if every Lipitor pill prescribed were taken, Pfizer expects that to increase its sales of the cholesterol-lowering drug by an extra $7 billion a year. Pfizer intends to use Vitality GlowCaps to grow its Lipitor business to $17 billion a year.

Pfizer logoVitality GlowCaps, are a wireless, Internet-connected bottle cap, that uses light and sound to alert users and phones home if they forget to take their medicine. Vitality and automated communication company Varolii, developed the GlowCap. The Glowcap has an embedded computer chip that communicates via low-frequency RF with a cellular-connected nightlight. The nightlight sends information to Vitality via a GE864-QUAD chip from Telit, a leader in the machine-to-machine (M2M) communications, over AT&T‘s (TGSM/GPRS network.

If a user misses a dose, an alarm will sound that gradually escalates “from a three-note arpeggio to an 11-note arpeggio,” Vitality President Josh Wachman told MobiHealthNews. The GlowCap can also flash a light, play a ringtone, send text messages or e-mails and even call the user’s mobile phone to remind them to take their medicine. The Dailywireless.org says that if the GlowCap remains unopened long enough, a patient will receive an automated call that asks a series of questions on why they didn’t take their medicine. GlowCaps also include a button that starts a call between the user’s phone and their pharmacy when the medication needs to be refilled.

Vitality GlowCapsVitality CEO David Rose told MobiHealthNews that the company was developing an iPad app for its pharma brand managers to help them track in real-time the success of their GlowCap programs. As part of the deal, Vitality gave away iPads to any GlowCap customer.  Mr. Rose said the freebies went to pharmacies and insurers. They distributed more than 10,000 GlowCaps to their customers. “With the secure app, they can see adherence patterns as they emerge, every day, in real-time. For example, they can see the total value higher adherence creates for the brand. The resulting cost-savings, in the case of insurers. Even how adherence varies by demographic slice or geography (media market),” Mr. Rose wrote.

The AT&T cellular-enabled GlowCaps which can be bought at CVS.com but no longer at Amazon.com comes with the night-light that connects wirelessly to AT&T’s cellular network, a bottle cap, and a six-month subscription to the service. After six months, subscriptions cost $15 a month.

rb-

Talk about convergence! Mobile-to-Mobile + Connected health-care +Data protection. Any wonder why we need IPv6?

According to RCR Wireless, “Connected Healthcare” is a term used to describe a model for healthcare delivery that uses technology to give healthcare remotely. Connected healthcare is a sub-set of all Machine to Machine (M2M) devices which are expected to increase by 36 percent this year. Utilities, healthcare, and securities industries will lead the charge to a total of 2.1 billion “connected M2M devices” by 2020, according to research from Analsys Mason.

What do you think?

Does the idea of getting harassed by your own medicine sit well with you?

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

What Is Your Digital Shadow?

What Is Your Digital Shadow?IDC recently released a study, The Diverse and Exploding Digital Universe: An Updated Forecast of Worldwide Information Growth Through 2011“, sponsored by storage vendor EMC. The report updates a similar study conducted in 2007. The report forecasts your digital shadow. Your digital shadow is the amounts and types of digital information in the world. The new IDC 2008 research shows the digital universe is bigger and growing more rapidly than 2007 estimates.

This growth is in part a result of:

  • Growing Internet access in emerging countries,
  • Social networks made up of digital content created by many millions users,
  • Growth in worldwide shipments of digital cameras, digital surveillance cameras, and digital televisions.

According to the study, the digital universe in 2007 was equal to almost 45 gigabytes (GB) of digital information for every person on Earth.

IDC’s research also examines how society and the digital universe interact with each another, how individuals actively contribute to the digital universe – leaving a digital footprint as Internet and social network users, email use, through use of cell phones, digital cameras and credit card transactions. “… we discovered that only about half of your digital footprint is related to your individual actions – taking pictures, sending emails, or making digital voice calls,” said John Gantz, Chief Research Officer and Senior Vice President, IDC.

What is your digital shadow

Enterprise IT organizations that gather the information which makes up digital shadows have a tremendous responsibility – in many cases mandated by law – for the security, privacy protection, reliability and legal compliance of this information According to Joe Tucci, EMC Chairman, President and CEO. “As people’s digital footprints continue growing, so too will the responsibility of organizations for the privacy, protection, availability and reliability of that information. The burden is on IT departments within organizations to address the risks and compliance rules around information misuse, data leakage and safeguarding against security breaches.”

The responsibility for governance of digital information remains primarily on the enterprise. Approximately 70% of the digital universe is created by individuals, yet enterprises are responsible for the security, privacy, reliability, and compliance of 85% of the digital universe.

Additional IDC findings

  • At 281 billion gigabytes (281 exabytes), the digital universe in 2007 was 10% bigger than originally estimated,
  • With a compound annual growth rate of almost 60%, the digital universe is projected to be nearly 1.8 zettabytes (1,800 exabytes) in 2011, a 10-fold increase over the next five years,
  • The information explosion, in raw gigabytes, is predominately visual: images, camcorder clips, digital TV signals, and surveillance streams.

Digital Diversity – Because of the growth of VoIP, sensors, and RFID, the number of electronic information “containers” – files, images, packets, tag contents – is growing 50% faster than the number of gigabytes. The information created in 2011 will be contained in more than 20 quadrillion – 20 million billion – of such containers, a tremendous management challenge for both businesses and consumers.

  • Digital Cameras – In 2007 fewer than 10% of all still images were captured on film.
  • Digital Surveillance – Shipments of networked digital surveillance cameras are doubling every year.
  • A single email with a 1Mb attachment can create over 50 Mb of digital footprint,

EMC also provides a tool to calculate the size of your own digital footprint, download a copy of the Personal Digital Footprint Calculator

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.