Skip to main content

January 28, 2019 - Smith - CSO online.  

 

 

 Ninety-five percent of the time, when I watch videos about cyber security, hacking, privacy, or surveillance, it's security conference video. In fact, some of the best out there are the TED lectures. While most of the big ones were made years ago (between 2008 and 2017), 2018 had several that are worth watching. Take a look at some of them.

 

What your smart devices know (and share) about you

Kashmir Hill and Surya Mattu gave a decent 2018 TED Talk called “What Your Smart Devices Know (and Share) About You.” Hill set up his one-bedroom apartment as a “smart home” for two months. She hooked up an Amazon echo, the lights, her coffee maker, a baby monitor, her son's toys, a vacuum cleaner, her TV, her toothbrush, a frame, a sex toy, and even her bed. And Mattu was responsible for monitoring the IoT devices that were spying on Hill.

Unsurprisingly, Mattu could see a lot. For example, with unencrypted data streams, such as when someone watched Hulu on smart TV, he could see everything. For encrypted data streams, it could only see metadata, but even that provides information. For example, he was able to find out what time the family wakes up in the morning because Amazon Echo would start playing Spotify songs between 6am and 8am.

 

How technology companies trick you into giving up your data and privacy

“How tech companies trick you into giving up your data and privacy” is a little related to the 2018 TED Talk that fits the TED Salon title. In the September 2018 video, Finn Lützow-Holm investigates the internet and data collection, explaining the alarming ways technology companies deceive their users and how personal data collected by companies is used on a scale you never could. would imagine & #8221 ;.

 

When technology can read minds, how will we protect our privacy?

Another November 2018 privacy-related TED Salon Talk by bioethicist Nita Farahany is entitled “When technology can read minds, how will we protect our privacy?” In her, she points out that “the average person thinks in a thousand thoughts all the days. ”There are already sensors in the headrests of the vehicle that track driver concentration, distraction and cognitive load while driving. Insurance companies practically love to track when attention diminishes. There will be more "mind reading" technology to come in the future.

 Farahany said:

I worry about the ability of our laws to keep up with technological change. Take the First Amendment of the US Constitution, which protects freedom of expression. Does this also protect freedom of thought? And if so, does that mean we are free to change our thoughts as we please? Or can the government or society tell us what we can do with our own brains? Can the NSA spy on our brains using these new mobile devices? Can companies that collect brain data through their applications sell this information to others? Right now, no law prevents them from doing so.

 

How dangerous are IoT devices?

Ben Gurion University professor Yuval Elovici, who is also head of his Cyber Security Research Center, also discusses the danger of IoT devices. In this January 2018 TEDx Talk, it takes us through a typical day a few years from now and makes us realize the power of connectivity, for better or for worse.

As Elovici explains, IoT devices collect a lot of information about nodes that is stored in the cloud where it will be analyzed to provide us with better services. However, if anyone is able to obtain this data, it will violate our privacy and may use that data against us.

In a potential scenario, Elovici describes a potential scenario in which data from his smart watch, which measures his alcohol level, can be combined with data from his smart car and then shared with law enforcement officials in their connected / smart cars. could charge us to drive under the influence.

It's all to consider when we connect our devices to the Internet.

 

How can we build trust in IoT?

Although the scope of my research was limited to the topics mentioned above, it was surprising to find so few TED Talks of new topics & #8211; made last year. In fact, the search for many of these conversations in 2018 usually fell within the scope of Tedx Talks, with the "x" indicating that it was an independently organized TED event.

One TEDx Talk from the University of Nevada you might like is “How We Build Trust in the Internet of Things.” In it, Daniel Price “discusses the future of IOT technology, the social network; what should we be excited about, and what should we be aware of? ”Neglect your“ smart ”toaster and it could go for sale. If your environment knows who you are, say goodbye to anonymity and hello to a note sent by jaywalking. (Hello China!) He gives serious, funny and even scary examples of the future of IoT, as well as how “IoT should be based on trust”.

When cyber prevents security

I also liked TEDxTufts (Tufts University) Talk “When Cyber ​​Prevents Security” by Winnona DeSombre, who is a threat intelligence researcher at Recorded Future. In it, she discusses how not including strong security when developing new Internet-connected devices can be disastrous.

An example she provides are the coded passwords embedded in routers, DVRs, and other connected devices. When they all have the same unchanging password, a hacker needs to find out only one password to be able to enter them all.

That's what happened to the Dyn attack on October 21, 2016 & #8211; A hacker broke into more than 100,000 devices and created a botnet that brought down the internet to the northeastern section of the United States and parts of Europe for a full day of work. This happened, she says, because companies were focused on pushing the newest and hottest products as cheaply as possible and didn't include safety in the process.

 

How do we need to redo the internet

Jaron Lanier's TED Talk April 2018, “How We Need to Redo the Internet,” brought the TED curator to First 10 Last year's conversations. The synopsis says: “In this visionary talk, Lanier reflects on a globally tragic, surprisingly ridiculous mistake. what companies like Google and Facebook did on the basis of digital culture & #8211; and how we can undo it. #8220; We cannot have a society in which, if two people wish to communicate, the only way that can happen is if it is funded by a third person who wants to manipulate them & #8221;

 

Online Privacy and Total Internet Freedom

In “Online Privacy and Total Freedom of the Internet,” a 2018 TEDx Talk Talk in Bucharest, security researcher Stefan Tanase asks: “Do we want to live in a world where digital privacy is a human right or want to live in a similar world to George Orwell's in 1984?

 

Defend yourself in this digital world. No one else will do it for you

Finally, on TEDx Talk “Defend yourself in this digital world. No one else will do it for you, ”says the expert Dutch in cyber security Arjen Kamphuis we need to keep safe & #8211; to take responsibility for our own defenses.

#8220; We can create our own IT systems that are independent and secure. We just need to decide to compromise our resources to make them & #8221; he says.

Although the lecture is interesting in itself, this is doubly done by the fact that  Kamphuis has disappeared a few months after giving the talk. It's worth noting that WikiLeaks tweeted various times about the mysterious disappearance of Kamphuis. Kamphuis is still missing, but friends and family said in december 2018 they believe he is still alive  & #8211; that its disappearance is voluntary. They say he did this kind of thing before dealing with a personal setback.

 

 

About [SAFEWAY]

THE [SAFEWAY] is a widely recognized company as a provider of premium information security and cybersecurity solutions. From its extensive portfolio, we highlight several solutions, including those based on platforms:

  • Archer da RSA Security, considered by the institutes  Gartnerand  Forrester and by the market itself, the most complete process integration solution for Governance, Risk Management, Compliance and Business Continuity Management;
  • [SAFEWAY]Security Tower, supported by IBMQradar (Watson technology), tailored to each organization in its security and cyber defense management needs.
  • And others, involving technologies  Imperva,  Thales,  BeyondTrust,  ManlyWatchGuard Technologies.