![Page 1: The Mobile Internet of Things and Cyber Security](https://reader036.vdocument.in/reader036/viewer/2022082915/5472bf60b4af9fcd0a8b5051/html5/thumbnails/1.jpg)
The Mobile Internet of Things and Cyber Security
Andy Davis, Research Director NCC Group
Image from: vint.sogeti.com
![Page 2: The Mobile Internet of Things and Cyber Security](https://reader036.vdocument.in/reader036/viewer/2022082915/5472bf60b4af9fcd0a8b5051/html5/thumbnails/2.jpg)
Which has recently been in the news with security issues?
Images from:www.dreamstime.comwww.nationaltransaction.comwww.remodelista.com
1. Rubbish bin 2. POS terminal 3. Refrigerator
![Page 3: The Mobile Internet of Things and Cyber Security](https://reader036.vdocument.in/reader036/viewer/2022082915/5472bf60b4af9fcd0a8b5051/html5/thumbnails/3.jpg)
Price is low
Image from: www.bookcoupon.info
Gartner: The Internet of Things, which excludes PCs, tablets and smartphones, will grow to 26 billion units installed in 2020
![Page 4: The Mobile Internet of Things and Cyber Security](https://reader036.vdocument.in/reader036/viewer/2022082915/5472bf60b4af9fcd0a8b5051/html5/thumbnails/4.jpg)
Machine to Machine communications
Image from: www.telecoms.com
• Assumptions about who can communicate with these devices
![Page 5: The Mobile Internet of Things and Cyber Security](https://reader036.vdocument.in/reader036/viewer/2022082915/5472bf60b4af9fcd0a8b5051/html5/thumbnails/5.jpg)
Security through obscurity
Image from: www.treachery.net
• Outdated concept
• Hidden != Protected
• Still alive in the embedded world
• Who would want to reverse-engineer this?
![Page 6: The Mobile Internet of Things and Cyber Security](https://reader036.vdocument.in/reader036/viewer/2022082915/5472bf60b4af9fcd0a8b5051/html5/thumbnails/6.jpg)
Software updates?
Image: us.blackberry.com
• Auto-updates?
• Manual updates unlikely
• Vulnerabilities persist for years
![Page 7: The Mobile Internet of Things and Cyber Security](https://reader036.vdocument.in/reader036/viewer/2022082915/5472bf60b4af9fcd0a8b5051/html5/thumbnails/7.jpg)
End users / OEMs: What do you need to know?
• Devices are cheap (for you and for an attacker)
• If machines can talk to your machine then so can humans
• If data need protecting, encrypt it, don’t hide it – someone will find it
• If updates are available, make sure you install them
• Attackers are actively targeting these devices