article thumbnail

On IoT Devices and Software Liability

Schneier on Security

New law journal article : Smart Device Manufacturer Liability and Redress for Third-Party Cyberattack Victims Abstract: Smart devices are used to facilitate cyberattacks against both their users and third parties.

IoT 100
article thumbnail

Securing the International IoT Supply Chain

Schneier on Security

Together with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. The basic problem we try to solve is: how to you enforce IoT security regulations when most of the stuff is made in other countries? Selling to U.S. cybersecurity agencies.

IoT 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

Achieving the IoT’s bold objective requires not only bringing many small things together and carefully orchestrating their interconnections, but also the assurance that their integrity and the data they collect remains secure and trustworthy. Therefore, manufacturing is the first critical link in the chain to establish trust across the IoT.

article thumbnail

Winnti Group was planning a devastating supply-chain attack against Asian manufacturer

Security Affairs

Winnti Group is back with a new modular Win backdoor that was used to infect the servers of a high-profile Asian mobile hardware and software manufacturer. ” reads the paper published by ESET. The post Winnti Group was planning a devastating supply-chain attack against Asian manufacturer appeared first on Security Affairs.

article thumbnail

Hacking Hardware Security Modules

Schneier on Security

Security researchers Gabriel Campana and Jean-Baptiste Bédrune are giving a hardware security module (HSM) talk at BlackHat in August: This highly technical presentation targets an HSM manufactured by a vendor whose solutions are usually found in major banks and large cloud service providers. Here's a summary in English.

article thumbnail

Private 5G Networks: Thales and Celona Collaborate to Bring Security and Performance to a Modern World

Thales Cloud Protection & Licensing

These private mobile networks are gaining significant traction in manufacturing, energy, government, logistics, and warehousing verticals. This transition is an opportunity to look at the next generation of security. Specifically, how can organizations apply high levels of security to 5G infrastructure without sacrificing performance?

article thumbnail

Safety and Security in Automated Driving

Adam Shostack

“ Safety First For Automated Driving ” is a big, over-arching whitepaper from a dozen automotive manufacturers and suppliers. This paper is the cybersecurity specialists making the argument that cyber will fit into safety, and how to do so. In a sense, this white paper captures a strategic threat model.

Paper 56