• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

Intel Security's Chris Young: Attackers Not Just Compromising Home Devices, They're Weaponizing Them

3076

intel

Cybersecurity practitioners are not paying enough attention to the home as a viable attack surface, especially as some adversaries change their tactics from compromising and stealing data from vulnerable devices to weaponizing them, warned Christopher Young, SVP and general manager at Intel Security, at the 2017 RSA Conference on Tuesday.

In a keynote session, Young expressed concern that security professionals are so preoccupied with the cloud as an emerging threat surface, that they ignoring the looming danger of connected Internet of Things devices at home. “ We' ve given the enemy all the scale they could possibly want by connecting our homes with smarter, faster, better devices, by leveraging big-data analytics to drive really important decisions that coordinate much of what we do in society,” said Young, who is set to become CEO when Intel Security spins off from Intel Corporation and rebrands itself as McAfee.

Young cautioned attendees to take employee homes into account when developing work policies, building cybersecurity architectures, and provisioning tools. “ If you want to worry about where your next corporate vulnerability or governmental vulnerability might lie, it' s likely to be in the home of the people who work for you,” he noted.

Young cited the Mirai botnet' s attack on the Domain Name System service provider Dyn as a prime example of IoT' s power, and how home devices can be used destructively. “ I' d argue that this is just a test. The attackers are just trying to see what they can do next, what' s possible, what are the limits of their capabilities,” he said.

Tags:
grayson
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 5 )

Q

What is Secure Boot?

A

Secure Boot is one feature of the latest Unified Extensible Firmware Interface (UEFI) 2.3.1 specification (Errata C). The feature defines an entirely new interface between operating system and firmware/BIOS.

When enabled and fully configured, Secure Boot helps a computer resist attacks and infection from malware. Secure Boot detects tampering with boot loaders, key operating system files, and unauthorized option ROMs by validating their digital signatures. Detections are blocked from running before they can attack or infect the system.

Q

How does Secure Boot work?

A

Secure Boot works like a security gate. Code with valid credentials gets through the gate and executes. However, Secure Boot blocks at the gate and rejects a code that has bad credentials, or no credential.

Q

What happens if a thin client fails?

A

Thin clients contain none of your files or software. So there is no need for recovery of data from them. A failed thin client can easily be replaced with another standby unit, without any loss of functionality. Hence your users’ work need not be interrupted while our service engineers repair the failed unit.

Q

How is installation and support handled?

A

Thinvent’s in-house team of server based computing experts will provide complete on-site installation of hardware, software and networking. Thereafter, we will provide one year of on-site support through our service network. Further on-site AMC can be purchased after this period.

Q

What about our existing PCs?

A

Thinvent’s server based computing solution will coexist peacefully with your existing IT equipment like PCs and networking. As and when your PCs become slow, we will convert them into thin clients using our Thinux software. This extends the life of your PCs for as long as their hardware does not fail.

Related Tutorials in Intel Security's Chris Young: Attackers Not Just Compromising Home Devices, They're Weaponizing Them

Related Tutorials in Intel Security's Chris Young: Attackers Not Just Compromising Home Devices, They're Weaponizing Them

How To Configure Time using timedatectl command
How To Configure Time using timedatectl command
Jun 16, 2016
chattr commands in Linux with examples
chattr commands in Linux with examples
Jun 11, 2016
How to use Special Character in Linux
How to use Special Character in Linux
Jun 17, 2016
How To Use (!) Symbol In Linux
How To Use (!) Symbol In Linux
Jun 18, 2016
How To Play with Word and Character Counts in Linux
How To Play with Word and Character Counts in Linux
Jun 17, 2016

Related Forums in Intel Security's Chris Young: Attackers Not Just Compromising Home Devices, They're Weaponizing Them

Related Forums in Intel Security's Chris Young: Attackers Not Just Compromising Home Devices, They're Weaponizing Them

Linux
jayce class=
shasum command not found
May 5, 2017
Echo
grayson class=
how to add to last line in echo command
May 12, 2017
Advanced commands
michael class=
how to block creating new user in linux
Feb 8, 2017
Linux
david class=
difference between whereis and which command
May 4, 2017
Advanced commands
caden class=
how to use chatter command
Feb 8, 2017
Advanced commands
isaiah class=
What is the use of SUID & SGID commands
Feb 11, 2017
Linux
landon class=
how to use hwclock command
May 4, 2017
Lolcat
jayce class=
lolcat command usage
May 2, 2017

Related News in Intel Security's Chris Young: Attackers Not Just Compromising Home Devices, They're Weaponizing Them

Related News in Intel Security's Chris Young: Attackers Not Just Compromising Home Devices, They're Weaponizing Them

Intel Security's Chris Young: Attackers Not Just Compromising Home Devices, They're Weaponizing Them
Intel Security's Chris Young: Attackers Not Just Compromising Home Devices, They're Weaponizing Them
Feb 16, 2017
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Sebastian ?
How to change non required to required field in SuiteCRM Custom/Default Modules

How to change not required to the required field in SuiteCRM Custom/Default Modules?

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.