Infrastructure security: Don’t just sit there, do something!
Confused by conflicting indications from the control panel, operators made a series of bad decisions which exacerbated the problems. The reactor core, starved of vital coolant, started to overheat. Radioactive material began to vent into the outer protective enclosure.

Infrastructure security: Don’t just sit there, do something!

Smart traffic lights cause jams when fed spoofed data
But no, we can’t have nice things like smooth, smart, algorithmically timed sailing through intersections – at least, not with the current state of traffic technology. A team of five researchers from the University of Michigan have found that the DOT’s I-SIG (Intelligent Traffic Signal System) is way too easy to spoof with bad data.
https://nakedsecurity.sophos.com/2018/03/08/smart-traffic-lights-cause-jams-when-fed-spoofed-data/

BlackBerry’s post-phone future includes IoT security
BlackBerry hasn’t been shy about shifting its focus away from hardware and toward technologies you can find inside others’ devices, such as self-driving cars and secure comms. If you need any further proof, though, you just got it: BlackBerry has struck a deal with Swiss electronics maker Punkt to secure an upcoming range of Internet of Things devices.
https://www.engadget.com/2018/03/07/blackberry-punkt-deal-secures-iot-devices/

How can IoT stakeholders mitigate the risk of life-threatening cyberattacks?
With an estimated 20 billion Internet-connected devices set to appear in our homes and offices by the end of the decade, future cyberattacks will dwarf what we’ve seen to date. These connected devices will feed into fundamental infrastructure we rely on every day: transportation, power plants, medical devices, and supply chains, for example. As cyberattacks move from financial and reputation risks into the realm of ‘life and death’ consequences, which IoT stakeholders should we turn to to address this?

How can IoT stakeholders mitigate the risk of life-threatening cyberattacks?

Connected Cars Pose New Security Challenges
Very few objects are as personal to their owners as their cars. But today’s cars have grown beyond a form of self-expression and turned into our personal concierges, navigating the best routes, making our dinner reservations, and potentially reserving parking spots ahead of our arrival. But with all the advantages connected vehicles can bring to our lives, they can also potentially expose us to security risks.
https://www.darkreading.com/endpoint/connected-cars-pose-new-security-challenges/a/d-id/1331166

IOT SECURITY DISCONNECT: AS ATTACKS SPIKE, DEVICE PATCHING STILL LAGS
According to a report by Trustwave released last week, 61 percent of companies surveyed who have deployed some level of connected technology have also had to deal with a security incident that they can trace back to an IoT device. On the flip side, only 49 percent of those same businesses surveyed said they have formal patching policies and procedures in place that would help prevent attacks.

IoT Security Disconnect: As Attacks Spike, Device Patching Still Lags

What to understand about health care IoT and its security
As we have seen, the Internet of Things will disrupt and change every industry and how actors within it do business. Along with new paradigms in services and products that one can offer due to the proliferation of IoT, come business risks as well as heightened security concerns – both physical and cyber. In our prior column, we spoke about this topic in the context of the Smart Electric Grid. Today we’re taking a look at how IoT is disrupting the health care market and how we can take steps to secure it.
https://www.networkworld.com/article/3260788/internet-of-things/what-to-understand-about-health-care-iot-and-securing-it.html

Backdooring connected cars for covert remote control
We’ve all known for a while now that the security of connected cars leaves a lot to be desired. The latest proof of that sad state of affairs comes from Argentinian security researchers and hackers Sheila Ayelen Berta and Claudio Caracciolo. The pair is set to demonstrate a hardware backdoor for the CAN bus that can be controlled remotely at the upcoming Hack in the Box conference in Amsterdam.

Backdooring connected cars for covert remote control