IoT News | August 16, 2018
Cybersecurity solutions provider Check Point Software Technologies’ latest Global Threat Index for July 2018 reveals a significant rise in exploits targeting three major IoT vulnerabilities. According to the company, these attacks, which are linked to the propagation of IoT malware like Mirai, IoTroop/Reaper and VPNFilter, have more than doubled since May. The top 10 ‘most exploited’ list includes MVPower DVR router Remote Code Execution at fifth position; D Link DSL-2750B router Remote Command Execution at seventh; and Dasan GPON router Authentication Bypass at tenth position. The data shows 45% of organisations around the globe getting affected by attacks targeting these vulnerabilities, compared with 35% in June 2018 and 21% in May. These vulnerabilities allow attackers to execute malicious code and gain remote control of the target devices. July’s top three ‘most wanted’ malware includes: Coinhive, Cryptoloot, and Dorkbot. The month’s top 3 ‘most vulnerabilities’ include: Lokibot, Triada, and Guerilla. Maya Horowitz, threat intelligence group manager at Check Point, said: “Known vulnerabilities offer cyber-criminals an easy, relatively frictionless entry point into corporate networks, enabling them to propagate a wide range of attacks. IoT vulnerabilities in particular are often ‘the path of least resistance’, as once one device is compromised, it can be straightforward to infiltrate further connected devices.
Read More
eWeek | July 16, 2018
Oracle claims its blockchain cloud service is the only one on the market that provides users with a development platform to build their own networks. Oracle, in its latest step to move its franchise to cloud services, launched its Oracle Blockchain Cloud ServiceJuly 16 to general availability. It has been in the development stage for more than a year. The service allows organizations to build blockchain networks to enable more secure and efficient transactions and to track goods through supply chains on a global scale. The use of blockchain’s digital ledger is a growing trend because it offers a new level of security in business transactions that wasn’t available previously. With security at the top of everybody’s list for finding new solutions fast, this idea has caused a lot of interest in a short period of time. The high-level is this: Blockchain is all about trust—namely, trust among vetted partners in business transactions. Blockchain is a type of data structure that enables identifying and tracking transactions digitally and sharing this information across a distributed network of computers, creating a trusted network. It's All About Peer-to-Peer Networks. Blockchain originally was designed to be the underlying peer-to-peer network support structure for transactions made in Bitcoin or another cryptocurrency. Constantly growing as “completed” blocks (the most recent transactions) are recorded and added to it in chronological order, a blockchain allows market participants to keep track of digital currency transactions without central record-keeping. Each node (a computer connected to the network) gets a copy of the blockchain, which is downloaded automatically. Early adopters of Oracle's blockchain cloud service include Arab Jordan Investment Bank, CargoSmart, Certified Origins, Indian Oil, Intelipost, M2O, Neurosoft, Nigeria Customs, Sofbang and Solar Site Design.
Read More
June 14, 2016
Industry perspectives on the relationship between network functions virtualization (NFV) and software-defined networking (SDN) are evolving, and for the better. NFV has long been championed by telcos as a way first to reduce capex by eliminating proprietary appliances, and more recently as the key to virtualizing much of their operations. SDN was described as orthogonal and complementary, but not essential for NFV; neither SDN nor NFV depended on the other.
Read More