‘Trust Mark’ Certification for IoT Devices

The program, called the IoT Security Trust Mark, is aimed at helping connected device manufacturers embed safety and security by design as well as proactively protect consumers, says Matt Tett, who is chair of IoTAA’s cybersecurity and network resilience workstream enabler and managing director of Enex TestLab. The effort, slated to launch in September, could eventually expand worldwide.

Know more: Freelancing jobs

“The remit is big,” Tett says. “It could be moms and dads in their homes buying TVs and fridges or smart speakers and devices for their kids, or it could be a government department or agency that’s looking to put in the latest conferencing system. There’s a whole gamut of stakeholders.”

There are plenty of examples of connected device security going wrong. For example, an Australian company that sells the TicTokTrack, a GPS-tracking smartwatch for kids, twice introduced a security flaw that could have allowed an attacker to spoof a child’s location.

Tett says the Trust Mark program, which has a rigorous testing component, could help manufacturers avoid those kinds of problems.

Most Challenging Time For India’s IT Sector

India’s information technology sector has never seen challenging times that it is witnessing now due to the Covid-19 impact, according to industry veteran S Mahalingam, but they have come up with innovative ways to deliver services.

Know more about the technology engineer.

As far as export is concerned, Indian IT companies have come out with innovative ways of ensuring that delivery takes place flawlessly from the country, and have been delivering service at a very high level even in the lockdown situation, he said. “That’s a phenomenal kind of thing which shows that both the communication infrastructure as well as the ability to come up with a remote secure environment.

Nothing comes as a comparable thing to what is happening now,” Mahalingam, former chief financial officer and executive director at Tata Consultancy Services Ltd., said in an interview to PTI. “This is the most serious one; impact is going to be phenomenal because while essentially IT Industry has proved (its capability) … but we have to ensure that global businesses resume.

Industry throws weight behind mobile Linux

Today saw the public unveiling of a new cooperative effort among suppliers to further develop the open source operating system Linux for use on consumer mobile devices, such as smartphones and tablet PCs.

The non-profit joint venture, entitled Linaro, includes IT giant IBM, chip designer ARM Holdings and device manufacturer Samsung. It employs around 100 engineers who are working to optimise device components for use with existing Linux-based mobile operating systems, such as Meego, Google’s Android and WebOS, recently acquired by Hewlett-Packard as part of device maker Palm.

Know more @ Linux system administrator jobs

“The dramatic growth of open source software development can now be seen in Internet-based, always-connected mobile and consumer products,” said Linaro CEO Lantzsc in a press statement. Linaro “will help accelerate this trend further by increasing investment on key open source projects and providing industry alignment with the community to deliver the best Linux-based products for the benefit of the consumer.”

The significance of mobile operating systems in general, and of Linux-based examples in particular, was highlighted by HP CEO Mark Hurd yesterday. Speaking at the All Things Digital conference in New York, Hurd confirmed that HP’s $1.2 billion acquisition of Palm was primarily motivated by the company’s ownership of WebOS.

“We didn’t buy Palm to be in the smartphone business”, he said, according to a ZDNet report. “We bought it for the [intellectual property].”

 

When is a Network Switch Necessary?

A network switch is necessary when there are too few ethernet ports on the router. This could be for a variety of reasons. For example, if you want to install an entertainment system, you will likely need a network switch. In this case, all of the pieces of the entertainment center are will probably be installed in the same general area so the network switch can be placed in a central location without much wiring.

Another situation where a network switch could be helpful is for devices located across your house which you want to be wired into the internet including desktop computers, televisions, or gaming consoles. Having all of those devices on wifi could cause a slower connection for not only the device itself but other technologies that need wifi such as your phone or smart home systems.

Additionally, you should note that ethernet cables tend to be most efficient when they are less than a hundred feet long so you may need to find a central location if you are wiring your entire house for ethernet.

The Switch Network Installer and Repairman’s primary duty is installing, rearranging, or removing switching. The Switch Network Installer and Repairman Job Description also includes tasks such as monitoring the distribution, routing, dialing, and switching equipment utilized in the facility.

The Switch Network Installer and Repairman also provide any technical support required for ground-level installation of communication wiring or communication equipment.

Web Application Supply Chain Threats

Over the past several weeks, I’ve learned more about the supply chain for household items than I’d ever have cared to know. Who knew that the supply chain for toilet paper was so fragile?!

Those of us who focus on defending web applications are increasingly turning our attention to the supply chain that makes up modern web applications. Following a string of fraudsters pilfering payment details in payment skimming attacks, the Payment Card Industry (PCI) has raised awareness of these risks by issuing a series of warnings and educational webinars on the topic. We have repeatedly seen attackers gain control of first or third-party JavaScript running on websites to pull off these attacks.

Know more about the cyber security consultants.

In a recent study of web traffic, researchers at Akamai discovered that 67% of content on the average website is delivered by a third-party. It isn’t surprising that attackers have turned their attention to the supply chain for web applications, since it now has critical mass.

Trends in development suggest that the share of content sourced from third parties will only grow over time as website owners look for faster, cheaper ways to introduce new functionality.

Attackers can also achieve greater yields if they can compromise a provider of third-party JavaScript as it could potentially give them access to trusted JavaScript running on hundreds, or even thousands of websites.

Not only are these attacks growing in frequency, but attackers are drawing inspiration from techniques previously observed in endpoint malware evasion. The Pipka strain of malware discovered by Visa’s fraud team demonstrated the capability to remove itself from the .html once it has executed. This type of technique is common in malware observed in corporate networks, but is novel for malware embedded in website JavaScript.

Attackers have also been observed employing domain generation algorithms (DGA) for the command and control (C2) component of formjacking attacks, another example of borrowing a technique long observed in desktop malware. The DGA has the impact of making static blacklists of C2 infrastructure less useful. The ongoing evasions are to be expected and will continue to challenge web defenders.

Want to Start a Career in IT?

So, you are considering a career in information technology? How exciting! By now you’ve probably heard that IT careers are booming and expected to continue this growth trend over the course of many years.

Beginning a career in this area allows you to stay on top of technology and pick a path that’s right for you. A career in the many different areas of information technology give you the ability to make your own path.

With so many diverse areas of study and practice, the sky is the limits for how far you will go. With everything from management to security to program development – there are many directions your IT career can take you.

Why a certification?
Entering an IT career is very different from many other occupational paths. While most careers begin inside the walls of a college campus – this field is different. The standard path to securing the job of your dreams is to earn certifications in those areas you plan to work. Employers look for IT pros who possess the certifications that are most suitable for their needs.

Know mroe about the IT analyst salary.

Instead of spending years earning a college degree, IT certifications allow you to choose the track that is right for you and advance to the level you choose. Let’s take a look at five of the top certifications you can earn to be on your way to a new and lucrative career in the IT field.