Can Advanced Tech Protect Internet Security?
Roughly a week ago we had to deal with an internet shutdown in the Northeastern U.S. and as consequence now internet security experts are looking for ways to prevent this type of DDoS attacks from ever happening again.
Latest DDoD Attack's Lessons
According to Venture Beat, just last week the Internet of Things has turned against us. IoT connected devices such as DVRs, printers, baby monitors and others were used as the launching platform for a DDoS attack against Dyn's DNS infrastructure. The attack impacted major internet services such as Twitter, Paypal, Netflix and others.
All these top internet companies have invested heavily in cyber security defenses. For them, it may be surprising how could have been possible to be taken down by a bunch of $100 devices. The latest major cyber attack should be a wake-up call for the industry. Security experts have been discussed IoT threads for several years, but now the topic might finally become a mainstream conversation.
On the market today there are many IoT connected devices designed to have long battery life and to be low cost. Unfortunately, until now security was not a high priority IoT gadgets' product design. Most often these devices do not even have enough processor cycles and memory available to run security software and as consequence they do not constantly look for threats.
Nowadays, a hacker can easily exploit any wireless device and they are only a few steps away from getting onto the Internet or the corporate network where can do real damage. IoT has created an easily exploitable resource that creates plenty of opportunities for terrorism and cybercrime. This conjuncture creates a strong call to action for security startups. Emerging startups in the field of IoT security have the opportunity to come with innovative security solutions for the cloud and network.
The security protection can't realistically be built within the IoT connected device in most cases. For this reason, the industry will need to develop new layers of security. Advanced tech needs to be built for proxying and analyzing the traffic before these Internet of Things connected devices can communicate to more critical systems.
Future Advanced Tech For IoT Security
This, in fact, is not a really new concept. Companies already leverage various layers of security today, including encryption, endpoint software, firewalls, real-time analytics and various more categories of protection.
The primary focus of the last several years was the endpoint security. Now, it's time to rethink the endpoint security focus and increase the middle point security consisting of layers between the data, assets and services that need protection and the exploitable surface area of the Internet of Things. Innovation and creation of advanced technology in this "middle point security" offer new market opportunities in other product categories. The IoT threat is driving the creation of new security technology for the detection and profiling of all connected devices able to connect to the network, regardless of their primary communication protocol.
According to The Daily Caller, there are already available today several security network services such as Akamai and Cloudfare. However, the problem is that they can be still too expensive. Individuals and companies have to evaluate whether the benefits of employing such a service are outweighing the costs.
While today's security protection is typically focused on wired and Wifi-connected devices, the next generation threats may come from communicating over Z-Wave, ZigBee, or Bluetooth. First step to defending this new communication platform may start by identifying potential malicious devices.
Another area of interest for the new advanced tech for IoT security is monitoring and analysis of traffic generated by IoT gadgets. For a strong defense it might be critical to understand the malicious traffic before it can be inserted into the flow of legitimate traffic flowing over the internet or network.
How To Prepare For The Next DDoS Attack?
After the biggest DDoS attack in internet's history, it's time to get yourself prepared.
Hackers Used New IoT Weapon For Friday's Internet Attack
According to internet security experts, hackers used a new IoT weapon to perform last Friday's internet attack at an unprecedented scale.
New Cybercrime Trends Are A Danger For IoT Security
IoT security faces challenges ahead highlighted by the new cybercrime trends.
Microsoft's New Cybersecurity Engagement Center Opens In Mexico, Aims To Improve Users' Safety
Microsoft has publicly expressed their concern for the welfare of human beings in a global scale. This is the reason why they have extended their coverage of cybersecurity throughout Mexico to prevent the Latin American populace from being cyber attacked.
A Big Cyberattack Is Inevitable In 2017
According to security experts, in 2017 a big data breach is almost certain.
MORE IN ITECHPOST
Three Steps to Avoid Geographic Restrictions on the Internet
More and more websites and apps use geolocation for different purposes. Knowing the location from which users access their services allow service and solutions providers to deliver targeted content, specific features, and even a unique user experience. On a very basic level, geolocation can be used to automatically customize the language and currency of an e-commerce site.
New Retroreflective Material Could be Used in Nighttime Color-Changing Road Signs
BUFFALO, N.Y. -- A thin film that reflects light in intriguing ways could be used to make road signs that shine brightly and change color at night, according to a study that will be published on Aug. 9 in Science Advances.
Top 5 Video Games to Play for a Truly Unique First Date
Video games have a way of taking us outside of ourselves and live in a fantasy world. It's even better when you're playing a game with someone special!