Remove Book Remove Firmware Remove Information Security Remove Technology
article thumbnail

Topic-specific example 11/11: secure development

Notice Bored

Most if not all developments involve information (requirements/objectives, specifications, plans, status/progress reports etc.) and potentially substantial information risks. As is the way with ISO27k, the trick is to focus on the information risks. What changes are needed first, and why?

Risk 80
article thumbnail

IoT Secure Development Guide

Pen Test Partners

There is no concrete method to follow as it will rely on contents of the decomposed design from Step 2, but typical examples might include the following: Intellectual property in the device firmware. Deploy malicious firmware. link] [link] Have a software/firmware update mechanism. Cryptographic keys on the device or pod.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

Hacking 52
article thumbnail

10 Behaviors That Will Reduce Your Risk Online

Daniel Miessler

Keep your firmware and software updated. Turn on automatic updates, install updates from the operating system when you’re asked to, and make a regular habit of updating everything in your technology ecosystem. Keep all of your software and hardware religiously updated.

Risk 345
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Vamosi: But as someone who wrote a book questioning the security of our mass produced IoT devices, I wonder why no one bothered to test and certify these devices before they were installed? So nothing to do with electronics whatsoever other than we sell, you know, technology products, right, and cameras and things like that.

article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

Last year at Hacker Summer Camp I was invited to Mikko Hypponen’s book launch for If it’s Smart, It’s vulnerable. Whether it's finding a bug, whether it's for analyzing malware, it's just more of a like a compiler, it dooleys technology. And dealing with technology has new constraints. VAMOSI: I am not a gamer.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Anyone who has anyone in the information security community is usually melting under the hot Nevada sun. I write a monthly security column for Windows Secrets and I do a couple other things on the side. I've also written the book which I'll get to in a moment. This is a bytes and bullets. is or what it controls.

Hacking 40