Amphion Forum Highlights Promise and Problems of Internet of Things

Saturday, December 14, 2013

InfosecIsland News


SAN FRANCISCO -- Explosive growth in the number and diversity of devices connected to the Internet demands wholesale changes to the IT security industry, security experts told an audience of IT professionals at the Amphion Forum in San Francisco on Thursday.

“And, with the Industrial Internet and Internet of Things, the numbers are just staggering.”

With the Internet of Things is predicted to swell to some 50 billion connected endpoints by the end of the decade, device makers, corporations, regulators and the security industry need to cooperate to make sure smart devices don’t become prey to hackers and organized cyber crime syndicates, experts said.

“In terms of the threats we face, the problem is set to become far larger,” said James Isaacs, CEO of mobile application security vendor Mocana. “And, with the Industrial Internet and Internet of Things, the numbers are just staggering.”

Invoking Ben Franklin’s famous maxim, Isaacs told the assembled that the technology industry has to “hang together” against cyber criminals and other malicious actors “or we’ll surely hang separately.”

Too often, however, organizations affected by cyber incidents are reluctant to share valuable information that could protect others, Isaacs said.

His words were echoed by other speakers at the Forum, as well. Nitesh Dhanjani, an independent security researcher said that the security industry and device makers have to pay more attention to fundamental security issues like authorization and authentication, especially when the device in question could affect security in the physical world.

In the not-distant future, malicious programs that now scan networks for vulnerable Microsoft Windows machines will search for vulnerable Internet of Things devices like surveillance cameras, lights and other intelligent endpoints. “Botnet herders won’t just have access to the machines in an office, but physical devices that could number in the hundreds of thousands or millions,” he said.

Still, many of the lessons learned fighting PC viruses, worms and cyber attacks translate to the Internet of Things. Speaking Thursday morning, AJ Shipley, the Senior Director of Security Solutions at Wind River, a division of Intel, predicted the convergence of traditional “IT” (information technology) with “OT” (operational technology) more common in traditional industries. Companies will look for ways to adapt to the challenges posed by the Internet of Things in a way that builds on investments and best practices developed during the PC era, he said. “There’s no silver bullet,” Shipley said. “There’s no revolutionary approach to securing the Internet of Things.” Instead, we need to address and augment the security controls that are already in use on corporate networks.

Source: Mocana

Possibly Related Articles:
Internet of Things Mocana
Post Rating I Like this!
frigo maxx Western Union Transfer Service
skype:Andrew james flicker

I do transfer with software and on-site directly with credit cards that I spam westerunion in 15 mins you have your MTCN after I confirm your payment is 100% on thank you

We Have big Western Union Hack for everywhere and any time for you. We transfer money to all countries/territories in world that have Western Union. We can transfer big amounts and you can receive this money from your country. We accept payments of 10% of transfer and with big transfers we do give discounts .We make it very safe and the service is very fast. We make transfer and forward you your Western Union info without delay or issues. We give you the MTCN , sender info and all cashout info in 45 min to 1 hr.


Recipients First Name And Last Name

Recipients Address ( Country, City)

Recipients Zip Code


Why we are selling MTCN ?

Because we do percentage with our associates, but still to reduce risk we cannot to the same name all the time, that is why we take close to 10% per transaction. The transaction is done by using a series of transfers to our exchanger who then in turn send the money to the receiver. This is done to increase the margin of safety both for us and the receiver.


NO SUCH THING EXISTS in a western union hack. Some new customers ask us if we use this. There is no MTCN software available in the world currently that hacks in to western union. In fact they are available for free on the internet like for example here: but all you will get from it is probably a virus. Scammers also use this lie to lure newbies as they do not know this. The transaction is done by using a series of transfers to our exchanger using Fullz(full info cards) who then in turn send the money to the receiver. This is done so that the receiver receives clean funds.


We do not do percentage deals with people we do not know so please do not bother asking. The same goes for begging e.t.c.


Please note for transfers over $5000, for the western union hack, we divide the transfers but will equal your total amount: For example $20000 will be 2 transfers of $9000 and one transfer of $2000. This also depends on individual countries/Territories.


After we confirm payment wait 45 minutes then you get MTCN + all details for you to cash out. After your successful payment confirmation, You will receive the MTCN (10 numbers) + all details (sender name + country sender) for your cash-out money. You do get your MTCN immediately, whenever you want and anywhere that has Western Union. It is important to stay on standby during this time(45min to 1hr) while your transaction is taking place

Prices in USD (for people in US, Canada):

$1000 for $100
$2000 for $200
$3000 for $300
$4000 for $400
$5000 for $500
Prices in Euro (for people in Europe):

€1000 for €100
€2000 for €200
€3000 for €300
€4000 for €400
€5000 for €500
Prices in GBP (for people in UK):

£1000 for £100
£2000 for £200
£3000 for £300
£4000 for £400

and many more service available like credit card , Paypal , bank log ins etc
contact on
skype:Andrew james flicker
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.