Can Advanced Tech Protect Internet Security?
Roughly a week ago we had to deal with an internet shutdown in the Northeastern U.S. and as consequence now internet security experts are looking for ways to prevent this type of DDoS attacks from ever happening again.
Latest DDoD Attack's Lessons
According to Venture Beat, just last week the Internet of Things has turned against us. IoT connected devices such as DVRs, printers, baby monitors and others were used as the launching platform for a DDoS attack against Dyn's DNS infrastructure. The attack impacted major internet services such as Twitter, Paypal, Netflix and others.
All these top internet companies have invested heavily in cyber security defenses. For them, it may be surprising how could have been possible to be taken down by a bunch of $100 devices. The latest major cyber attack should be a wake-up call for the industry. Security experts have been discussed IoT threads for several years, but now the topic might finally become a mainstream conversation.
On the market today there are many IoT connected devices designed to have long battery life and to be low cost. Unfortunately, until now security was not a high priority IoT gadgets' product design. Most often these devices do not even have enough processor cycles and memory available to run security software and as consequence they do not constantly look for threats.
Nowadays, a hacker can easily exploit any wireless device and they are only a few steps away from getting onto the Internet or the corporate network where can do real damage. IoT has created an easily exploitable resource that creates plenty of opportunities for terrorism and cybercrime. This conjuncture creates a strong call to action for security startups. Emerging startups in the field of IoT security have the opportunity to come with innovative security solutions for the cloud and network.
The security protection can't realistically be built within the IoT connected device in most cases. For this reason, the industry will need to develop new layers of security. Advanced tech needs to be built for proxying and analyzing the traffic before these Internet of Things connected devices can communicate to more critical systems.
Future Advanced Tech For IoT Security
This, in fact, is not a really new concept. Companies already leverage various layers of security today, including encryption, endpoint software, firewalls, real-time analytics and various more categories of protection.
The primary focus of the last several years was the endpoint security. Now, it's time to rethink the endpoint security focus and increase the middle point security consisting of layers between the data, assets and services that need protection and the exploitable surface area of the Internet of Things. Innovation and creation of advanced technology in this "middle point security" offer new market opportunities in other product categories. The IoT threat is driving the creation of new security technology for the detection and profiling of all connected devices able to connect to the network, regardless of their primary communication protocol.
According to The Daily Caller, there are already available today several security network services such as Akamai and Cloudfare. However, the problem is that they can be still too expensive. Individuals and companies have to evaluate whether the benefits of employing such a service are outweighing the costs.
While today's security protection is typically focused on wired and Wifi-connected devices, the next generation threats may come from communicating over Z-Wave, ZigBee, or Bluetooth. First step to defending this new communication platform may start by identifying potential malicious devices.
Another area of interest for the new advanced tech for IoT security is monitoring and analysis of traffic generated by IoT gadgets. For a strong defense it might be critical to understand the malicious traffic before it can be inserted into the flow of legitimate traffic flowing over the internet or network.
How To Prepare For The Next DDoS Attack?
After the biggest DDoS attack in internet's history, it's time to get yourself prepared.
Hackers Used New IoT Weapon For Friday's Internet Attack
According to internet security experts, hackers used a new IoT weapon to perform last Friday's internet attack at an unprecedented scale.
New Cybercrime Trends Are A Danger For IoT Security
IoT security faces challenges ahead highlighted by the new cybercrime trends.
Stay Away from these 3 Fake VPN Apps!
Here are 3 fake VPN apps that hackers and scammers are using to access your computer: Beetle VPN, Buckler VPN, and
Hat VPN Pro!
Hackers Now Use Bluetooth to Penetrate Secured Device
Hackers are now capable of accessing your secured device through Bluetooth!
MORE IN ITECHPOST
6 COVID-19 Tracing Apps Including CDC Found to be Potential Threats to Your Privacy, Investigation Reveals
6 different COVID-19 tracing apps that included the CDC's official app were found to potentially be a threat to the user's privacy. Investigation reveals the unsettling truth about the apps.
Fortnite Secret Pro Tip: Proximity Mine + Remote Explosive = Drone
You can make a poor man's drone in Fortnite by combining a proximity mine and remote explosive. But how exactly do you make one?