Whether we think we should be connecting the IoT and our existing systems together or not, the basic imperative to extract business intelligence from the raw information will demand that the connection takes place.
There is still way too much apathy when it comes to data-centric security. Given the sensitive data the OPM was tasked with protecting, it should have had state-of-the-art data protection, but instead it has become the poster child for IT security neglect.
The Internet of Things (IoT) started like any other buzzword: poorly defined, used too often, and generally misunderstood. However, it stood the test of time and is now increasingly becoming part of everyday language, even with those outside the IT world.
Smartwatches with network and communication functionality represent a new and open frontier for cyberattack. HP found that all tested smartwatches contain significant vulnerabilities, including insufficient authentication, lack of encryption and privacy concerns.
Trend Micro researchers have analyzed the code of the actual spyware: RCS Android. It can do so many things and spy on so many levels that they consider it the most sophisticated Android malware ever exposed.