background preloader


Facebook Twitter

Specifio. La Privacy by Design appliquée aux Objets Connectés : vers une régulation efficiente du risque informationnel ? Consacrant un principe de prévention à la charge des opérateurs, la Privacy by Design est une voie féconde pour gérer le risque informationnel consubstantiel au développement du marché des objets connectés.

La Privacy by Design appliquée aux Objets Connectés : vers une régulation efficiente du risque informationnel ?

Cette méthode, désormais promue par le RGPD, doit être précisée afin de concilier protection et innovation. Une cinquantaine de milliards d’objets devraient être connectés dans le monde à court terme qui permettront de recueillir des données ensuite transmises à un équipement électronique pour piloter une application, traiter ces données corrélées et proposer un produit ou un service adapté. Ces Objets Connectés offrent des opportunités sans précédent pour l’individu dès lors qu’ils visent à lui proposer, grâce aux données qu’ils captent et transmettent, de nouveaux services innovants.

La promotion de la PbD s’explique par différents facteurs. A - Des mesures adaptées. Enjeux et réalités juridiques des Objets Connectés. It's time for a common sense security framework - Help Net Security. Privacy Rights Clearinghouse maintains a database of every data breach made public since 2005, and as the total number of records rapidly approaches one billion, board members, infosec leaders, and consumers are all asking the same question: Why does this keep happening?

It's time for a common sense security framework - Help Net Security

It’s not like we don’t collectively understand how to secure our systems and networks. NIST maintains nearly two hundred special publications focused on computer security, and the ISO 27000 series contains dozens of standards for securing information systems. What’s more, multiple industries have specific standards and regulations targeting information security and risk management controls. Retail has PCI. Healthcare has HIPAA. How Telefonica Is Using IoT And Big Data To Build Smart Cities.

Wearable cameras

Security - Botnet - DDoS attack - IoT in healthcare. Wearables. Smart TV. Fridge ordering your milk. Internet of Things. Smart bulbs. Smart meter. Connected toys. Miele's networked disinfecting hospital dishwasher has a gaping security flaw... The Miele PG 8528 is a "washer-disinfector" intended for hospitals and other locations with potentially dangerous pathogens on their dirty dishes; it's networked and smart.

Miele's networked disinfecting hospital dishwasher has a gaping security flaw...

And dumb. 10 Smart Accessories for Your Car. Scmagazine.stfi. The fact that U.S. intelligence agencies have the ability to use connected devices as spy tools may or may not be surprising, depending on one's level of cynicism.


But the fact that these household items can be easily hacked, even without advanced tools, places consumers in the unenviable position of not knowing the cyber protection level of their smart products – nor who is responsible if and when something negative happens. The mountain of evidence available proving Internet of Things (IoT) devices are not only vulnerable, but being regularly hacked might be tall enough to scare off the most intrepid mountain climber.

Between the March WikiLeaks reveal that the CIA used everyday-connected devices to gather intelligence, to the Mirai attacks in 2016 that recruited webcams into a botnet army that helped knock parts of the internet offline, the problem is serious and growing. IoT Application Using Watson IoT & IBM Blockchain. The Internet of Things (IoT) has opened up countless opportunities for businesses to drive smarter operations.

IoT Application Using Watson IoT & IBM Blockchain

Virtually every device and asset around us is becoming equipped with sensors that transmit data to the cloud. Naturally, many companies are eager to make IoT applications part of their business to drive new experiences, cut costs and generate efficiency. L’internet des objets : la 3ème révolution informatique – 27 avril 2017. Simultanément à la parution de leur ouvrage « Objets connectés : la 3ème révolution informatique », Gérard HAAS et Jean-Paul CRENN vous présenteront les véritables enjeux de cette révolution, tant au niveau stratégique que juridique.

L’internet des objets : la 3ème révolution informatique – 27 avril 2017

Leave a bad review? This IoT garage door opener maker may brick your device. The maker of an Internet of Things (IoT) garage door opener bricked a customer's device after they posted a negative review on the product's forum board.

Leave a bad review? This IoT garage door opener maker may brick your device

First a little background. In the spotlight is a device known as Garadget. According to its Indiegogo page, Garadget communicates with its cloud server via a user's Wi-Fi network. It attaches to the bottom of a regular garage door opener. Smart TVs, Microwaves: Stop Hackers From Spying On You. From televisions to toasters, all kinds of devices are getting hooked up to the Internet.

Smart TVs, Microwaves: Stop Hackers From Spying On You

That's bringing convenience, like air conditioning systems that can be activated remotely while you're on your way home from work. But it's also bringing new privacy concerns, as anything connected to the Internet tends to attract the attention of hackers. Case in point: Documents recently released by Wikileaks suggest the Central Intelligence Agency can use spying targets' TVs against them, turning the sets into always-listening microphones. Kellyanne Conway, counselor to President Donald Trump, also recently claimed that microwaves could also be used as spying devices, though she has since walked back those comments.

Other "smart" devices, meanwhile, have been caught secretly tracking their users' behavior and reporting that information back to the company that made them. Insurers must tread very carefully when using private data from wearables. Wearable technology is increasingly recognised as a means to deliver a wide range of benefits to businesses.

Insurers must tread very carefully when using private data from wearables

Recently, insurance providers have recognised ways of using data generated from wearable technology to balance risk, by identifying safe driving behaviour, as well as dangerous practices such as using a mobile phone while at the wheel. However, the information generated by wearable technology includes personal data, the use of which is rapidly becoming a heavily regulated activity, with severe penalties for non-compliant operators. Insurers that may be considering using personal data collected from wearable technology should recognise that the legal risk they may inadvertently assume potentially dwarfs any benefits.

Le fil. 185,000+ IoT security cameras are vulnerable to a new worm. Persirai is a new strain of Internet of Things malware that infects more than 1,250 models of security camera, all manufactured by an unnamed Chinese manufacturer that has sold at least 185,000 units worldwide. The vulnerability the malware exploits was discovered and documented by Pierre Kim, an independent security researcher, who has located at least 185,000 vulnerable devices using the Shodan search engine. The cameras all try to tunnel out of their local firewalls by sending unencrypted data over UDP -- a cousin to TCP -- leaving them vulnerable to hijacking. Once compromised, the cameras can be used to direct devastating, unstoppable floods of traffic to bring down web sites, and can also be remotely monitored by voyeurs, burglars, and other malefactors.

Announcing A New Open-Source Privacy Standard For The Internet Of Things – Co... L’Internet des Objets un formidable levier business pour les entreprises. Avec Internet, 7 milliards de personnes peuvent communiquer, échanger des informations, accéder à des services, s’ils disposent de l’énergie et des outils pour pouvoir le faire.

L’Internet des Objets un formidable levier business pour les entreprises.

Industrial Internet of Things under attack - Information Age. 'The Industrial Internet of Things ultimately delivers value to organisations, and that’s why we’re seeing an increase in deployments. Security can’t be an industry of ‘no’ in the face of innovation, and businesses can’t be effective without addressing risks' A study released today has looked at the rise of Industrial Internet of Things (IIoT) deployment in organisations, and to what extent it is expected to cause security problems in 2017.

IIoT are the connected devices in critical infrastructure segments such as energy, utilities, government, healthcare and finance. It's not just your TV that can track your habits without consent. IoT – Security Issues in Factory Automation and Control – Cyber World. Drones, Phones and Automobiles: How to reap the benefits of innovative technology AND foster trust - NewsroomNewsroom. The civilian drone market is taking off. Will European Commission avert IoT privacy risks?

Internet of Things (IoT) inaugurates new possibilities for the manufacturing industry, enabling the machines to become smarter by interacting with each other via internet connection. This may include devices that pose due to their speed, weight and other characteristics high security risk, notably connected cars. Other devices such as those comprising a smart home may pose lower safety and security risk yet equally high or higher IoT privacy risk, transmitting crucial information about their owners’ private lives.

European Commission and IoT European Commission has set up a platform with members from various industries, such as energy, healthcare and car manufacturing industry, in order to promote the IoT. The next step on its agenda is the proposal for rules on cybersecurity, intended to build up the trust of the industry to the powerful internet. The IOT privacy garden – ICC Belgium. In this paper, Ivan Vandermeersch, a former communication adviser at the Cabinet of the Vice-Prime Minister of Belgium in charge of Telecommunication and Public Enterprises, and current secretary general of BDMA (Belgian Direct Marketing Association) discusses the present and future challenges of policymakers with regard to privacy regulation in the context of connected devices.

Offering a thorough description and analysis of the landscape of personal data protection today, he challenges companies to build trust among customers for what matters the use of their personal data, and governments to cooperate internationally for smart privacy regulations that balance the benefits of technological innovation with the fundamental rights of citizens. On 25 January 2012, the European Commission sent its Proposal for a Data Protection Regulation to the European Council and the European Parliament.

The latter voted on its proposal on 12 March 2014, just before the European elections. A. B. Smart City needs smart privacy – mediaspotters. As European Capital of Innovation, Amsterdam is experimenting with a range of technologies which turn the city into a so-called “smart city”. With the beacon gadgets installed all over the city, more interaction with the public is made possible. A Discussion of "Owned: How the Internet of Things Took Our Property and Privacy" - Future of Privacy Forum. 5-steps-enhance-customer-experience-iot-analytics-108688.

What is the Internet of Things (IoT) Plus d'objets connectés que d'humains sur Terre. The Internet of Stranger Things. Internet of Things…and the Data We Love. Devices, Data and DecisionsThe Internet of Things is a fast growing platform of connected devices, machines and cloud technology, which is helping businesses better manage process, machines and decision making. La vérité sur…l’échec des objets connectés -

Peerlyst. EIP - Smart Cities and Communities Market Place. Rebecca Herold. Uk.businessinsider. The Internet of Things (IoT) has been labeled as "the next Industrial Revolution" because of the way it will change the way people live, work, entertain, and travel, as well as how governments and businesses interact with the world. In fact, the revolution is already starting. Home. Industrial Internet. Perceptive Privacy Protectors Push for IoT Privacy Protections - Perceptive privacy protectors push for IoT privacy protections. With IoT data, sometimes less is more for connected devices. Foisonnement d'idées pour les pansements connectés. How Will Terrorists Use the Internet of Things? The Justice Department Is Trying to Figure That Out.

Can Your 'Smart' Appliances Be Trusted with Your Personal Data? Probably Not... Uk.businessinsider. Un tatouage tactile pour contrôler à distance les objets connectés. The IoT threat to privacy.