Connect with us

Featured

IoT security arrives

Published

on

Internet of Things (IoT) is now not just a talking topic – it is now absolutely here with new connected devices arriving with their own security vulnerabilities – however, we are now starting to see the security for IoT advance.

The Internet of Things (IoT) has long been a game of rush-to-market, with production speed trumping security in the stampede, says ESET Southern Africa.

Securing millions of non-standard devices as disparate as home thermometers, smart TVs and cars is no trivial task. It is somewhat simpler if they have simple stripped down embedded processors, but often they contain full-fledged and powerful network-connected operating systems, with all the security problems those present.

In years past, it was non-obvious whether vendors were attempting to create security solutions without a corresponding real world threat. But as we see Android-related malware numbers steadily climb, it is no longer rare to spot scams or worse, on the platform. Additionally, as the importance and placement of IoT devices in more critical applications increases (think: “cars“), keeping rogue processes contained – regardless of their origin – seems wise.

One approach is to make each operating process mutually suspicious, containerize ed and separate from each other. But development is slower than just bolting on a standard OS like Android and shipping the product.

The good news is that Android security vendors here are implementing increasingly secure environments, but the rate of adoption is still far outpaced by the number of new devices hitting the market with unknown and unproven security chops.

Back to the mutually suspicious, or trusted computing platforms. While more difficult to develop against, they are typically far more resistant to attack. This has garnered the attention specifically of the automotive, government, and critical infrastructure market segments.

Luckily the companies like Lynx Software Technologies have been at it for some time now, and offer unique ways to approach the problem, with everything isolated – cores, memory, application, system and other resources – to form a very breach-resistant constellation of digital barriers that would curb the spread of nasty things. This sort of “paranoia” is most welcome in applications like avionics or medical devices, where no one wants to see “bad things” happen, and fundamentally, no-one wants. Prevention is better than detection.

Also, the network security folks have focused squarely on defending against rogue threats found on networks you might not think to look at, like CAN bus on automotive, or even ICS-related protocols like Modbus, which have been lightly defended (if at all) for decades.

As the importance and popularity of IoT continues to escalate and people place more valuable information thereupon, scammers and more hardened cybercriminals, will continue to look for new ways of attacking and compromising the swarm of devices which now surround us.

Featured

Smash hits the Nintendo Switch

Super Smash Bros. delivers what the fans wanted in the latest “Ultimate” instalment, writes BRYAN TURNER.

Published

on

Super Smash Bros. Ultimate, the latest addition to the popular Nintendo Smash series, has landed on the Nintendo Switch with a bang, selling 5-million copies in the first week of its release. The game has been long-anticipated since the console’s release, as many fans consider iy to be a Nintendo staple. And the wait was well worth it.

It features 74 playable fighters, 108 stages, almost 1300 Spirit characters to collect while playing, and a single-player Adventure mode that took about three days (or 28 hours) of gameplay to complete. The game offers far more gameplay than its predecessors, making it the Smash game that gives its players the best bang for their buck.

For those new to the game, the goal is to fight opponents and build up their damage score (draining their health) to knock them off the stage eventually. This makes the game seem chaotic, as many players jump around the platforms as if they were on quicksand, in order to avoid being hit by the other players.

It also services two kinds of players: the competitive and the casual.

Competitive players can be matched on the online service by skill ranking to enjoy playing with similarly high-skilled opponents. This is especially important in e-sports training for the game, and for players wanting to master combos against other human players. The casual gamer is also catered for, with eight-player chaos and button-mashing to see who comes out luckiest. This segment is also important for those wanting to learn how to play.

Training mode is also a place to go for those learning to play. It offers “CPU” players that are graded by intensity to train as a single player to learn a character’s moves, combos and general fighting style. More challenging CPU players can also be used by competitive players to train when there isn’t a Wi-Fi connection available.

Direct Play features in this game, allowing two players with two Switch consoles to play against each other over a direct connection – no Wi-Fi needed. This is especially useful to those who want to have a social gaming element on the go, similar to that of the cable connector of the Gameboy.

Click here to read Bryan Turner review of Super Smash Bros. Ultimate.

Previous Page1 of 3

Continue Reading

Competitions

Win Funko Fortnite in Vinyl

Gadget and Gammatek have nine Funko Fortnite figurines to give away.

Published

on

A Funko Pop figurine based on a character set is indicative of reaching the heights of pop culture. It is no surprise, then, that the world’s biggest online game, Fortnite, has its own line of Funko Pop figurines. The Funkos are modeled on the characters in game, including Drift, Ragnarok, Dark Vanguard, Volar, Tracera Ops, and Sparkle Specialist.

Now, local Funko distributor Gammatek has released the Fortnite figurines in South Africa. To celebrate, Gadget and Gammatek are giving away a set of three Funko Fortnite figurines to each of three readers (9 figurines in total). To enter, first click on your favourite Funko Pop on the next page and post the Tweet that appears. Then, follow Gadget on Twitter.

You can put the tweet in your own words, but entries must have the competition’s hashtag (#FunkoFortnite) and mention @GadgetZA to be considered valid.

Click here to select the Funko Fortnite character you want to tweet.

Previous Page1 of 2

Continue Reading

Trending

Copyright © 2018 World Wide Worx