article thumbnail

New IoT Security Regulations

Schneier on Security

And current liability laws make it hard to hold companies accountable for shoddy software security. It falls upon lawmakers to create laws that protect consumers. But it's just one of dozens of awful "security" measures commonly found in IoT devices. But software is different. This law is not a panacea.

IoT 222
article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

It’s now commonplace for high-resolution video cams to feed endless streams of image data into increasingly intelligent data mining software. It combines commodity video surveillance cameras and PCs with facial recognition software supplied by RealNetworks. Along with this comes the rising potential for abuse of the technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Passes First Of Its Kind IoT Cybersecurity Law

Privacy and Cybersecurity Law

California recently became the first state in the union to pass a cybersecurity law addressing “smart” devices and Internet of Things (IoT) technology. The term IoT generally refers to anything connected to the internet, including smart home devices (e.g., Amazon’s Alexa, NEST thermostats, etc.). Code § 1798.91.06(a))

IoT 45
article thumbnail

California Passes First Of Its Kind IoT Cybersecurity Law

Privacy and Cybersecurity Law

California recently became the first state in the union to pass a cybersecurity law addressing “smart” devices and Internet of Things (IoT) technology. The term IoT generally refers to anything connected to the internet, including smart home devices (e.g., Amazon’s Alexa, NEST thermostats, etc.). Code § 1798.91.06(a))

IoT 45
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

If I were a state attorney general or a consumer protection official at the state or federal level, I would certainly take a very close look at what’s happened here and I would think there have to be lawsuits and enforcement proceedings coming.”. “It Look at the Mac operating system.

article thumbnail

US Government Accountability Office Releases New Report On The Internet of Things (IoT)

Privacy and Cybersecurity Law

.” In the report, the GAO provides an introduction to the Internet of Things (IoT), describes what is known about current and emerging IoT technologies, and examines the implications of their use. Technological Advancements Leading To IoT Surge. Common Components Of IoT Devices. Common Components Of IoT Devices.

IoT 40
article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

It was not a literal time machine, but a way of capturing the software development process by recording intervals and storing them in the close. In the Forbes article I never published, Dan said quote- “The reason that software is so inexpensive, we actually are very good at estimating development time. And software?