SlideShare a Scribd company logo
The Mobile Internet of Things
and Cyber Security
Andy Davis, Research Director NCC Group

Image from: vint.sogeti.com
Which has recently been in the news with security issues?
1. Rubbish bin

Images from:
www.dreamstime.com
www.nationaltransaction.com
www.remodelista.com

2. POS terminal

3. Refrigerator
Price is low
Gartner: The Internet of
Things, which excludes
PCs, tablets and
smartphones, will grow
to 26 billion units installed
in 2020

Image from: www.bookcoupon.info
Machine to Machine communications
• Assumptions about who
can communicate with
these devices

Image from: www.telecoms.com
Security through obscurity
• Outdated concept
• Hidden != Protected
• Still alive in the embedded world
• Who would want to reverse-engineer this?

Image from: www.treachery.net
Software updates?
• Auto-updates?
• Manual updates unlikely
• Vulnerabilities persist for years

Image: us.blackberry.com
End users / OEMs: What do you need to know?
• Devices are cheap (for you and for an attacker)
• If machines can talk to your machine then so can humans
• If data need protecting, encrypt it, don’t hide it – someone will find it
• If updates are available, make sure you install them
• Attackers are actively targeting these devices

More Related Content

PDF
2012 12-04 --ncc_group_-_mobile_threat_war_room
PDF
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
PPTX
​Understanding the Internet of Things
PDF
2012 State of Mobile Survey Global Key Findings
PDF
Mobile Security for Smartphones and Tablets
PDF
Symantec Mobile Security Whitepaper June 2011
PPTX
Internet & iot security
PDF
Mobile Device Security
2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
​Understanding the Internet of Things
2012 State of Mobile Survey Global Key Findings
Mobile Security for Smartphones and Tablets
Symantec Mobile Security Whitepaper June 2011
Internet & iot security
Mobile Device Security

What's hot (19)

PDF
New trends in Payments Security: NFC & Mobile
PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
PPTX
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
PPTX
How to create a secure IoT device
PPTX
Internet safty
PPTX
Keynote at the Cyber Security Summit Prague 2015
PPT
Mobile Device Security
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PDF
New VIPRE_DS_EndpointSecurity_2016
PPTX
Webinar on Enterprise Security & android
PDF
BYOD / Mobile-Device Security Guidelines for CxO's
PDF
Tips and Tricks for Building Secure Mobile Apps
PPTX
Essential Layers of IBM i Security Series – Network Security
KEY
Shrinking Role of MDM
PPTX
Cyber Security Overview for Small Businesses
PPT
Mobile Apps Security
PPTX
Cyber Security: Strategies, Defence and what’s not working
PPTX
MaaS360 with Watson
PPTX
Artificial Intelligence and Cybersecurity
New trends in Payments Security: NFC & Mobile
Mobile Security: The 5 Questions Modern Organizations Are Asking
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
How to create a secure IoT device
Internet safty
Keynote at the Cyber Security Summit Prague 2015
Mobile Device Security
IoT Security, Threats and Challenges By V.P.Prabhakaran
New VIPRE_DS_EndpointSecurity_2016
Webinar on Enterprise Security & android
BYOD / Mobile-Device Security Guidelines for CxO's
Tips and Tricks for Building Secure Mobile Apps
Essential Layers of IBM i Security Series – Network Security
Shrinking Role of MDM
Cyber Security Overview for Small Businesses
Mobile Apps Security
Cyber Security: Strategies, Defence and what’s not working
MaaS360 with Watson
Artificial Intelligence and Cybersecurity
Ad

Viewers also liked (20)

PDF
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
PDF
Docking stations andy_davis_ncc_group_slides
PPTX
Exploiting appliances presentation v1.1-vids-removed
PDF
NCC Group 44Con Workshop: How to assess and secure ios apps
PDF
Pki 201 Key Management
PPTX
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
PPTX
Practical SME Security on a Shoestring
PDF
How we breach small and medium enterprises (SMEs)
PDF
Pki 202 Architechture Models and CRLs
PPTX
Ncc group overview presentation august 2012 final
PPTX
Mobile App Security: Enterprise Checklist
PPTX
NCC Group Presentation
PDF
A (not-so-quick) Primer on iOS Encryption David Schuetz - NCC Group
PDF
Cryptography101
PDF
07182013 Hacking Appliances: Ironic exploits in security products
PPTX
PDF
Ncc Group Escrow Overview 2010
PDF
How Spotify Helps Their Engineers Grow - Chris Angove
PDF
Current & Emerging Cyber Security Threats
PDF
USB: Undermining Security Barriers
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Docking stations andy_davis_ncc_group_slides
Exploiting appliances presentation v1.1-vids-removed
NCC Group 44Con Workshop: How to assess and secure ios apps
Pki 201 Key Management
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
Practical SME Security on a Shoestring
How we breach small and medium enterprises (SMEs)
Pki 202 Architechture Models and CRLs
Ncc group overview presentation august 2012 final
Mobile App Security: Enterprise Checklist
NCC Group Presentation
A (not-so-quick) Primer on iOS Encryption David Schuetz - NCC Group
Cryptography101
07182013 Hacking Appliances: Ironic exploits in security products
Ncc Group Escrow Overview 2010
How Spotify Helps Their Engineers Grow - Chris Angove
Current & Emerging Cyber Security Threats
USB: Undermining Security Barriers
Ad

Similar to The Mobile Internet of Things and Cyber Security (20)

PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PDF
Internet of Things, Examples and Issues
PPTX
IOT.pptx
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PPTX
All The Things: Security, Privacy & Safety in a World of Connected Devices
PPTX
IOT presentation.pptx
PPTX
Internet of Things
PPTX
Internet of Things Security
PPTX
Secure your Space: The Internet of Things
PDF
[TestWarez 2017] Securing the Internet of Things
PDF
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
PDF
Wireless security and the internet of things nick hunn
PPTX
Security challenges for internet of things
PPTX
IoT and the industrial Internet of Things - june 20 2019
PPTX
How to Avoid IoTageddon
PPTX
Security In an IoT World
PPTX
The internet of things (io t)
PPTX
The internet of things (io t) : IoT academy
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PPTX
IoT Security Briefing FBI 07 23-2017 final
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Internet of Things, Examples and Issues
IOT.pptx
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
All The Things: Security, Privacy & Safety in a World of Connected Devices
IOT presentation.pptx
Internet of Things
Internet of Things Security
Secure your Space: The Internet of Things
[TestWarez 2017] Securing the Internet of Things
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
Wireless security and the internet of things nick hunn
Security challenges for internet of things
IoT and the industrial Internet of Things - june 20 2019
How to Avoid IoTageddon
Security In an IoT World
The internet of things (io t)
The internet of things (io t) : IoT academy
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
IoT Security Briefing FBI 07 23-2017 final

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
August Patch Tuesday
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
A comparative analysis of optical character recognition models for extracting...
Group 1 Presentation -Planning and Decision Making .pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
Heart disease approach using modified random forest and particle swarm optimi...
August Patch Tuesday
cloud_computing_Infrastucture_as_cloud_p
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

The Mobile Internet of Things and Cyber Security

  • 1. The Mobile Internet of Things and Cyber Security Andy Davis, Research Director NCC Group Image from: vint.sogeti.com
  • 2. Which has recently been in the news with security issues? 1. Rubbish bin Images from: www.dreamstime.com www.nationaltransaction.com www.remodelista.com 2. POS terminal 3. Refrigerator
  • 3. Price is low Gartner: The Internet of Things, which excludes PCs, tablets and smartphones, will grow to 26 billion units installed in 2020 Image from: www.bookcoupon.info
  • 4. Machine to Machine communications • Assumptions about who can communicate with these devices Image from: www.telecoms.com
  • 5. Security through obscurity • Outdated concept • Hidden != Protected • Still alive in the embedded world • Who would want to reverse-engineer this? Image from: www.treachery.net
  • 6. Software updates? • Auto-updates? • Manual updates unlikely • Vulnerabilities persist for years Image: us.blackberry.com
  • 7. End users / OEMs: What do you need to know? • Devices are cheap (for you and for an attacker) • If machines can talk to your machine then so can humans • If data need protecting, encrypt it, don’t hide it – someone will find it • If updates are available, make sure you install them • Attackers are actively targeting these devices