IOT & SDL: Securing Windows 10 IOT at the Requirements level

Security Development Lifecycle (SDL) in Windows 10 IOT is part of the convergence of information technology, data science and operational technology that makes up the latest cycle of the Internet of Things.  Using Windows 10 in your IOT systems allows you to provide defense-in-depth trust model for your hardware, secure boot, validation of trusted drivers…

3

Security: 5 URL’s that I found for K-12 programs from undercover agencies

Security is a big deal right now, likely there will be money for research, training and high schools through various agencies. Not saying these are going to give you money, but if you are a non-profit trying to get funding for your CS program, these might be another source.  Might want to check with the…

0

IOT: Texas Instruments FRAM Microcontroller or System on Chip

Sometimes you wonder if a company is just gone.  Texas Instruments is one of those companies I don’t think about too often these days, but more and more you find that they are a foundational chip manufacturer.  LighBlue Bean, Spark.IO, both owe their existence to the low-power but non-encrypted CC2541.  What if you could get…

0

List of four Kinect Security items

For a device that should be all about games, people are sure thinking up ways to use the Kinect for things like medicine and security.  With security you might want to take a look at the following URLs: In home paranoia: Kinect Long Term Privacy Issues Daunting? A cover for your Kinect: Address Security and…

0

An interesting paper on Point and Shoot outdoor game from AT&T

Now this is an interesting paper that I will definitely get to after I read all of the Clive Clisser books and so forth this vacation.  The paper describes how to design a game that uses the point and shoot technology using a smartphone.  It comes with all of the angles and dangle kinds of…

0

The Osama Bin Laden picture virus: a real threat or phony

With the announcement that Osama Bin Laden is dead, the scammers will likely pop up with social engineering around this news item.  If you are a regular reader of this blog, it is likely that you are fully patched, have an anti-virus and can deal with malware, but what about your Mom?  Older Sister?  Uncle…

0

University of Wisconsin, Madison finds GIANT number of security bugs during Windows 7 production

In a paper titled: Incremental Compositional Dynamic Test Generation, researchers from the University of Wisconsin, Madison, during the production phase of Windows 7, found one-third of all of the security bugs in Windows 7, using a process called Satisfiability Modulo Theories (SMT) solver or as it also known as: Z3.  Since these bugs were found…

0

Thoughts on the Kinect hacks and iPad Hacks

Wow, wouldn’t it be nice to have tools like XNA Game studio to  build an application that used Kinect on the Xbox?  I think it would be a great idea.  On the other hand, using Kinect hacks outside of academics?  Waste of time.  Focus on Windows Presentation Foundation, learn XAML, learn HTML5, better use of…

12

Linux, Apple or Windows: Security-Linux Loses the 3 month vulnerabilities listing

Rule one of security: Don’t assume that your software is safe.  Apple users (not Apple Corporation) make the assumption that their software is secure from viral attacks.  Is this true?  How do you determine if one system is more secure than the other? You could ask Apple or Microsoft, or a Linux user group.  In…

1