Android Things Promises to Close IoT Security Holes

IoT or the Internet of Things has been to this point a seriously unsecured cluster-flop for the most part.  Millions of insecure devices are in our homes and businesses, and these devices may be eavesdropped, recording audio or video, performing a DDoS attack, or being leveraged as an easy access pivot point into your network for further exploitation

Thankfully, progress is being made in this area by Google, who released a new software development platform called Android Things and it is targeted at IoT device development. Things is designed to leverage the power of the Android platform, which is not limited to just phones.  Things allows for rapid prototyping that leads to full products, and provides both security and scalability.

One of the major improvements provided by Things is provisioning of automatic security and other updates automatically, without user intervention required.  Update intervals are expected to be between one to two weeks.  This is a serious improvement over the current expectation that users learn how to and remember to perform periodic software and firmware upgrades themselves.

Interested developers can get a Things-certified development kit for $199.  Raspberry Pi can also be used as a development platform.

For more information, see the article at Tech Republic, or at Google’s Android Developer site.

 

0

About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.