Hojt Communication | Security News
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
page-template,page-template-blog-masonry,page-template-blog-masonry-php,page,page-id-18965,ajax_fade,page_not_loaded,,select-child-theme-ver-1.0.0,select-theme-ver-4.5,wpb-js-composer js-comp-ver-5.5.2,vc_responsive

The web is overflowing with information, especially when it comes to hot topics like security, mobility and Internet of Things.


Since we make it our business to be on top of the latest development we find a lot of interesting news and blog posts. We publish them here in our curated Security News, with our comments, and with links to the original material.

6 Iot Security Fundamentals That Need To Be Solved

See on Scoop.itApps and Internet of Things

This is "6 Iot Security Fundamentals That Need To Be Solved" presentation from the IoT conference in Lund

Internet of Things is still very immature. There is not even a consensus in what it means. It covers many different technologies like the new entrants wearables and connected household supplies, but also the very mature technologies in m2m. Vendors large and small hurry to launch products and take their stakes in this emerging markets. ITU-T standards and industry consortiums popping up everywhere that try to make some order in this chaos, but there are no common agreed uniform standards just yet.

So, if you start your IoT development projects today, there might not be one simple way of doing secure IoT. Different products and implementations require different solutions and strategies. A wearable will be something completely different from a connected medical device, or a Smart Home, or Smart City. However, there are some common characteristics that need to be handled as product design criterias from the start:

1. IoT products must die
2. Rosetta stone
3. Thanks for letting me in!
4. The fall of the wall
5. Rubber bands
6. The disappearing act

6 Iot Security Fundamentals That Need To Be Solved

See on vimeo.com

Email Is Forever – and It’s Not Private | SecurityWeek.Com

See on Scoop.itSAFEWIRE.it secure file transfer

Conventional email security solutions may defend against spam, viruses, and malware, but they don’t defend against ignorance or egregious stupidity.

"Dance like no one is watching; email like it may one day be read aloud in a deposition."

E-mail is less secure than a postcard, cause the postcard can be thrown away after it has been received.

See on securityweek.com

Someone Is Learning How to Take Down the Internet

See on Scoop.itSecure communication

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don’t know who is doing this, but it feels like a large a large nation state.

Someone is extensively testing the core defensive capabilities of the companies that provide critical Internet services.

See on lawfareblog.com

No over-the-air update means GM has to recall four million cars to…

See on Scoop.itApps and Internet of Things

US motor company General Motors is recalling four million vehicles worldwide due to a software bug that has been linked to at least one death.

This patching process is a remnant from the old ages before IT, and NOT an acceptable way to deliver secure and safe products. Immediate over-the-air security patching is a fundamental necessity in anything IoT.

See on hotforsecurity.com