CRN
2016 Internet Of Things 50: 5 Coolest IoT Security Vendors
by Lindsey O'Donnell
Bastille approaches the Internet of Things market by detecting and mitigating threats in IoT applications through security sensors, software and airborne emission detection.
TechTarget
Identity of things? IAM system to change as IoT invades the workplace
By Robert Lemos
Companies in certain industries -- manufacturing, healthcare and critical infrastructure -- are already dealing with securing the internet of things; others will have to start.
Xconomy
You May Have Helped Crash the Internet. But How Would You Know?
by Bernadette Tansey
Cyberattackers this month brought down Internet access to Twitter, Netflix, Airbnb, the New York Times, and many other companies by hijacking thousands of poorly protected devices and forcing them to overwhelm a key Web traffic hub with a barrage of messages.
You—in the form of your camera, printer, router, or other device—may have been one of the hapless recruits to the cybercriminals’ renegade army. If so, how would you ever find out?
The unwelcome signs, according to cybersecurity expert Chris Risley, include everything from sluggishness in your device’s performance, to mysteriously high data charges on your next smartphone bill, or—worst-case scenario—a federal agent knocking on your company’s door with a subpoena.
Risley, the CEO of Atlanta security company Bastille, is one of the cyber defense experts who have been analyzing an attack on Manchester, NH-based Internet performance management company Dyn, which was the target of a denial-of-service attack Oct. 21 that blocked Web traffic to its customers, such as Twitter.
The Register
Hackers pop top 'secure' wireless keyboard and mouse kits, gain RCE
By Darren Pauli
Klostermeier's and Deeg's attack uses an internal Python tool that inputs keystrokes into command using the inbuilt Windows virtual keyboard to run attack commands. It also uses with the Crazyradio PA USB device, and leverages Bastille's nrf research firmware to pull off the attacks.
The pair published a proof-of-concept video demonstrating the three-minute attack against the Microsoft Wireless Desktop 2000 which they say can be sped up to reduce time to compromise.
Their work joins efforts by internet-of-radio-things security company Bastille which in July hosed low-cost wireless keyboard and mouse setups through a bug it called KeySniffer. ®
IoT World News
Bastille Focused on Protecting Enterprise IoT as Part of the 'Internet of Radios'
By Edward Gately
Bob Baxley, Bastille 's chief engineer, tells us the biggest secret about the IoT security landscape is that it's not about the "things," but rather about the radios (radio frequency).
"Enterprises are more at risk of a radio-based attack than ever before because enterprises don't have the security protocols in place to properly identify and mitigate these threats," he says. "There is concern, but there needs to be greater concern about the vulnerability in IoT networks because there's a gap between IoT security awareness and preparedness in the enterprise. Seeing as many of these devices contain vulnerabilities that hackers can exploit and use as a portal for entry into an organization's network, adopting a solution like Bastille Enterprise allows organizations to determine if a device on the network is acting abnormally and identify threats or attacks that might be occurring."
IoT Central
Report: List of Top 10 Internet of Radios Vulnerabilities
By David Oro
The IoT has a big security problem. We've discussed it here, here and here. Adding to these woes is a new report on the Top 10 Internet of Radios Vulnerabilities. Yes, radios...because IoT so much more than data, networking, software, analytics devices, platforms, etc. When you're not hardwired, radio is the only thing keeping you connected.
MobiHealthNews
Experts Weigh In On How To Defend Against Cybersecurity Threats to Connected Digital Health Devices
By Bill Siwicki
Seventy-eight percent of business professionals, including healthcare executives, believe the threat from the so-called Internet of Radios will increase in the next 12 months, according to a new study from Bastille Networks Internet Security, a vendor of enterprise threat detection technology and services.
RCR Wireless
Bastille releases IoT security solution to protect enterprises from attacks
By Phillip Tracy
Bastille, which focuses on security for enterprise “internet of things” deployments, announced a new solution that uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security. The services is designed to enable the ability to sense, identify and localize potential threats so security teams can take action and preemptively remove those threats.
SDxCentral
Bastille Says Its Software-Defined Sensors Will Stop Security Threats
By Sue Marek
Bastille, a San Francisco-based startup, says its software-defined radio sensors will be able to protect enterprises from security threats to their networks.
The company’s patented technology pairs software-defined radio sensors with machine learning to identify abnormal events on the wireless network regardless of whether it is WiFi, Bluetooth, cellular, or another Internet of Things (IoT) protocol.
Healthcare IT News
Top 10 Internet of Things cybersecurity threats and expert advice about how to fight back
By Bill Siwicki
Seventy-eight percent of business professionals, including healthcare executives, believe the threat from the so-called Internet of Radios will increase in the next 12 months, according to a new study from Bastille Networks Internet Security, a vendor of enterprise threat detection technology and services.
Politico
Morning Cybersecurity: Cyber Radio Killed the Star
By Tim Starks
CYBER RADIO KILLED THE STAR — The biggest vulnerability at the intersection of cyber and radio are rogue cell towers, followed by rogue Wi-Fi hotspots, according to rankings out from Bastille today. What the first one means: Hackers with simple, relatively inexpensive tools can hijack cellphone connections, using them to break past two-factor authentication. The second is about impersonating legitimate Wi-Fi hotspots and getting into people’s devices that way.
Wired
Akamai Finds Longtime Security Flaw in 2 Million Devices
By Lily Hay Newman
It's well known that the Internet of Things is woefully insecure, but the most shameful and frustrating part is that some of the vulnerabilities that are currently being exploited could have been eradicated years ago. Now evidence of how these bugs are being used in attacks is calling attention to security holes that are long overdue to be plugged.