LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com    |  Contact Us          
‘Complexity is the enemy of security’ … especially in IoT

‘Complexity is the enemy of security’ … especially in IoT

There is an old saying in the IT security space, one that applies really across any type of security: Complexity is the enemy of security.

It’s hard to pin down exactly who coined this phrase. Among the earliest references to it are from IT security guru Bruce Schneier. And Schneier’s discussion of this principle is probably among the clearest: systems get harder to secure as they get more complex. And since our systems are getting more complex all the time, security is becoming more challenging.

Today’s poster child for the Complexity-Security inverse correlation is Internet of Things device security.

Continue reading “‘Complexity is the enemy of security’ … especially in IoT” »

Secure boot on Snapdragon 410

Secure boot on Snapdragon 410

Qualcomm Snapdragon processors support secure boot which ensures only authenticated software runs on the device. By configuring the processor for secure boot, unauthorized or modified code is prevented from being run. The authenticity of the image is verified by use digital signatures and certificate chain.

Secure Boot process overview

On Qualcomm processors the first piece of software that runs is called Primary BootLoader (PBL) and it resides in immutable read-only-memory (ROM) of the processor. By configuring the processor for secure boot, PBL can verify the authenticity of the Secondary BootLoader (SBL) before executing it. Continue reading “Secure boot on Snapdragon 410” »

IoT Security: Don’t Ship Product Without It

IoT Security: Don’t Ship Product Without It

Devices connected via IoT technology are spreading across multiple industries at unprecedented rates. But the benefits of enhanced connectivity are accompanied by increased security risks.

IoT technology is used in everything from healthcare devices, to transportation infrastructure, to industrial control systems supporting operationally critical processes.

According to Forbes, some 80 billion devices will be connected to the internet by the year 2025. In terms of customer convenience and effective performance, this trend could be game-changing for people who rely on technology to explore, work, and live.

Continue reading “IoT Security: Don’t Ship Product Without It” »

The FBI Warns of IoT Security Issues Once Again

The FBI Warns of IoT Security Issues Once Again

The US Federal Bureau of Investigation has issued a warning about Internet of Things device security issues, the latest in a continuing string of IoT attack and security vulnerability warnings from the US’s top law enforcement agency.

Attackers are using compromised IoT devices as proxies to mask various illicit activities, the FBI said, citing spamming, click-fraud, illegal trade, botnets for hire, and other crimes being committed using IoT devices.

The Bureau said IoT device vulnerabilities are being exploited by these attackers, naming routers, media streaming devices, Raspberry Pis, IP cameras, network attached storage (NAS) devices as among the types of products covered by the warning.

Continue reading “The FBI Warns of IoT Security Issues Once Again” »

Why is traditional IT security failing to protect the IoT?

Why is traditional IT security failing to protect the IoT?

The traditional IT security architecture has been through a mammoth, global stress test in recent years thanks to the environment of escalating attacks and huge data breaches.

But perhaps the biggest challenge of all to the traditional IT security architecture has been in the IT evolution driven by the Internet of Things (IoT), Cloud Computing, Edge Computing and related innovations.

Continue reading “Why is traditional IT security failing to protect the IoT?” »

Why choose TimeStorm IDE over standard Eclipse for embedded Linux development?

Why choose TimeStorm IDE over standard Eclipse for embedded Linux development?

As the product manager for TimeStorm, I am often asked the following two questions about TimeStorm, our Integrated Development Environment (IDE):

  1. Why would I need an integrated development environment?
  2. What can I do with TimeStorm that I can not do using Eclipse with available open source plugins?

Continue reading “Why choose TimeStorm IDE over standard Eclipse for embedded Linux development?” »