STE WILLIAMS

Hacked Robots Present a New Insider Threat

Robots and their control software are rife with critical and painfully obvious security flaws that make them easily hackable, new research shows.

Popular robotics products contain glaring and serious security vulnerabilities that could easily be exploited to hack and take control of a robot’s movements and operations for spying or causing physical damage – and even posing a danger to humans.

 More on Security Live at Interop ITX

Call it the new insider threat:  IOActive researchers Cesar Cerrudo and Lucas Apa have discovered some 50 flaws in popular robots and robot-control software used in businesses, industrial sites, and homes that could allow a hacker to remotely manipulate a robot moving about the office, plant floor, or home, to infiltrate other networks there, spy and steal information, and even wreak physical destruction.

Robots are getting “smarter” and in some cases, with more human-like qualities such as facial recognition features, all of which is helping propel their popularity and usability. IDC estimates that in 2020, worldwide spending on robotics will be at $188 billion. Robots today are mostly in the manufacturing industry, but the consumer and healthcare sectors are up-and-coming in their robotics adoption, according to IDC.

“A robot being inside [an organization] is actually a reality” today, notes IOActive’s Apa, pointing to the rise of use in smart robotics technology. “And it’s very difficult to distinguish between a robot that’s been hacked” and one that’s not, he says. 

A hacked robot could silently be used to go rogue and hack other networks within the office, or even other robots, according to the researchers, who say robots indeed could be the next-generation insider threat.

Apa, who is a senior security consultant with IOActive, and Cerrudo, IOActive’s CTO, in their new research, studied robots and robotics control software products from Softbank Robotics, UBTECH Robotics, Robotis, Universal Robots, Rethink Robotics, and Asratec Corp. The researchers say they wanted to drill down on the security issues now, before robots become mainstream.

The robots and their control software were rife with some of the same security flaws common in notoriously insecure Internet of Things devices: insecure communications weaknesses such as cleartext or weak encryption between the robot and its components that provide its commands and software updates; a lack of authentication (no credentials required to access a robot’s services, for example); and lack of authorization measures, which could leave a robot at the mercy of a nefarious attacker.

In addition, they found weak cryptography in the devices and their software that leave sensitive data and information stored in the robots at risk, such as passwords, crypto keys, and vendor service credentials, for example. Some of the devices also come with weak default configurations that don’t properly lock down the robots and their operations, and Cerrudo and Apa found that some of these devices couldn’t even be properly retrofitted with new passwords, nor even fixed once they had been hacked.

“It can be hard to restore a robot to its original [uncompromised] state,” Apa says. “With some vendors’ products we analyzed, it was impossible,” so the customer is stuck with a hacked robotic system, he says.

Turns out robots also suffer from some of the same open-source framework and library vulnerabilities of other software systems. Many robots run on the the Robot Operating System (ROS), which comes with cleartext communication, authentication, and weak authorization features, according to IOActive. “In the robotics community, it seems common to share software frameworks, libraries, operating systems, etc., for robot development and programming. This isn’t bad if the software is secure; unfortunately, this isn’t the case here,” the researchers wrote in their report published today.

Don Bailey, founder and CEO of Lab Mouse Security, says robot vulnerabilities are another example of the flaws found in embedded, IoT devices. “They’re all embedded systems. You’re going to keep seeing the same threats, over and over,” says Bailey, an IoT security expert.

The bigger risk of today’s robotics-type devices, he says, is data leaking and privacy breaches. The Amazon Alexa and Apple Siri-style smart devices and others can be used more for espionage, he says. “As they [robots] grow into more substantial technologies, we’ll see more [physical] danger to humans,” Bailey says.

A serious concern today is the provisioning and sunsetting of robotics products, he says. “How a robot associates itself with its owner” and what happens when that owner hands it over to another owner or user, pose security and privacy risks, he says. It’s unclear how a new “owner” could be protected from the previous one still having access to the robot, for example.

IOActive’s Apa and Cerrudo aren’t releasing vulnerability details at this time, as they await responses from the vendors. So far, they’ve only heard back from four of them. “Only two said they are going to fix” the flaws, Cerrudo says. The other two indicated they understood they should “do something about it,” he says.

They weren’t able to actually test all of the robots, due to the expense of some of the devices as well as global shipping restrictions, so they mainly analyzed robot software, including mobile apps, operating systems, and firmware images. Those are core elements of robotic systems, they say, so they could get a good take on the security from them as well as from the physical robots they did have in hand.

Interestingly, the researchers say they easily found the flaws without drilling down too deeply in their security audit of the products, since their aim was to get a more high-level sense of robot security today. They aren’t finished, though, and plan to do some deeper dives, they say.

“We consider many of the vulnerabilities we found simple to exploit,” Apa says. “Anyone with a phone and app can remotely control the robot [via these bugs]. They don’t need to develop an exploit.”

Among the products with flaws were SoftBank Robotics’ NAO and Pepper robots; UBTECH Robotics’ Alpha 1S and Alpha 2 robots; ROBOTIS’s OP2 and THORMANG3 robots; Universal Robots’ UR3, UR5, and UR10 robots; Rethink Robotics’s Baxter and Sawyer robots; and Asratec Corp.’s robots using V-Sido.

In one especially creepy scenario, the researchers say robots with face-recognition features in order to work with humans could be hacked and even manipulate their co-workers. Robots often come with microphones and cameras, so an attacker could employ the robot like a spy to get information, for example. “If an attacker can control this, they can use the built-in features to get information about the faces the robot recognizes,” Apa says.

IOActive isn’t the first to explore robot security: Researchers at the University of Washington in 2015 hacked a surgical robot to demonstrate how a bad guy could hijack and take control of a robot during surgery.

For now, business and home robotics users are basically at the mercy of their insecure robots, the researchers say. What can they do to protect themselves: “Pray,” Cerrudo quips. “If I was a robot user, I would unplug it when I’m away at night,” for example, he says.

Related Content:

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: http://www.darkreading.com/vulnerabilities---threats/hacked-robots-present-a-new-insider-threat/d/d-id/1328292?_mc=RSS_DR_EDT

Best Practices for Lowering Ransomware Risk

The first step is to avoid falling prey in the first place. That means teaching your entire organization – from IT staff to executive management – how not to be a victim.

In recent months, ransomware campaign activity has increased exponentially. Over 27,000 incidents surged on the scene in early 2017 when a commonly misconfigured setting on open source database called MongoDB made hundreds of thousands of databases vulnerable to ransom. Threat actors logged on to victims’ databases, backed up data offsite, deleted it, and offered to return it for .2 Bitcoins, which translates to $200. 

 More on Security Live at Interop ITX

While this might seem like a minuscule amount, there is logic behind it. If too much is asked, the propensity to pay declines. Plus, the volume of the attack yields serious dividends. Regardless, for those afflicted, losing access to important information to operate a business is extremely disconcerting, creating desperation and making them prone to pay up.

The Mechanics
There are two primary vectors into a commercial IT environment. The first is to assume remote access to a user’s computer and traverse the network until administrator credentials to databases and data stores are gained. This is accomplished by sending an employee a phishing email that entices them to open an attachment or visit a compromised website that loads malicious code on their computer terminal. Once the computer is compromised, threat actors scan the environment and try to find a computer terminal used to access network data. After a foothold on an administrator’s computer is established, they can remotely encrypt or wipe data and then issue ransom demands. 

The second method is more of a frontal assault on the database servers. Most companies have public-facing websites and, as a result, threat actors will find a server with a vulnerable application, then exploit it to get a foothold in the data center. If an IT staff has not properly separated public-facing websites from database servers and file shares –  a common mistake with small staffs –  a threat actor can use that access to pursue the database. While this vector requires more sophistication, ransomware actors are increasingly pivoting in this direction, implying that more skilled actors are getting into the game.

The Response
With all of these new techniques in play, what can security teams do to mitigate the threat? The good news is that your IT staff is probably already doing many of the things needed to protect your environment. Here are a few best practices to help lower the risk further:

User Vector:

  • Establish a third-party user education program on how to identify a phishing email.
  • Shut down the ability for user terminals to share resources peer-to-peer.
  • Implement a back-up strategy for personal data on external drives or virtual drives.
  • Install a reputable antivirus program that will block a majority of known ransomware attacks.

Website Vector:

  • Never host an external-facing server on the same hardware as a database or data store.
  • Ensure proper segmentation between web servers and database servers. 
  • Track vulnerability patch status of critical data servers and file shares.
  • Make sure IT staff has a data back-up strategy for databases and file shares,
  • Consider using secure third-party cloud or virtualized services for critical data storage and files shares offsite.

Advanced Planning Outside Resources:

  • Have an incident response plan in place before an incident occurs. Having a plan in place allows for the immediate documentation all of the possible decisions and communication plans that need to be applied under the pressure of a real-life incident. 
  • Visit the NoMoreRansom.org website to seek assistance. This non-profit website is a partnership between antivirus vendors, international law enforcement, and cybersecurity threat researchers. This resource has helped thousands of victims decrypt data, complete with recommendations for what to do in the event of an attack. 
  • Pay or not pay? A final consideration that enters the mind of many is whether or not to pay the ransom. The majority experts’ view is consistent with those of the Federal Bureau of Investigation – do not pay. However, this is an easy decision for third-parties to make because it is someone else’s data being ransomed. 

At the end of the day, the decision will come down to the impact of the attack on your company’s business. While ransomware actors in many cases return the data as promised, they may leave backdoors to return for more money, time and time again, or may not return data at all.

These present very unattractive options, so it is best to avoid falling prey in the first place. To be successful, advance preparation and applying proven best practices will be the most effective way to avoid a ransomware scenario completely. Having an entire organization aligned on how to avoid being a victim, from the IT staff to executive management, is essential to maintain the sanctity of data.

Related Content:

Jeff Schilling, a retired U.S. Army colonel, is Armor’s chief security officer. He is responsible for the cyber and physical security programs for the corporate environment and customer-focused capabilities. His areas of focus include cloud operations, client services, … View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/best-practices-for-lowering-ransomware-risk/a/d-id/1328294?_mc=RSS_DR_EDT

New Cybersecurity Regulations Begin Today For NY Banks

New York’s new security regulations for financial industry viewed as potential model for other states.

Today’s the day the much-anticipated new cybersecurity regulations for the financial industry go into effect in the state of New York.

Security experts say the new regulations by the state’s Department of Financial Services (DFS) set a minimum baseline for security best practices, and acknowledge that small- to midsized businesses with fewer resources and smaller IT staffs may find compliance more challenging.

The regulations require that banks, insurance companies, and other financial institutions establish and maintain a cybersecurity program. The new rules are widely viewed as the first of their kind and potentially a baseline model for other states.

“These new regulations will push companies to have a basic level of cybersecurity, but it doesn’t create an unfair competitive situation because it’s generally applied across the board,” says Tim Erlin, senior director, product management and IT risk and security strategist at Tripwire.

The new regulations will be phased in over the next two years. Companies with less than $5 million in revenues and $10 million in assets are exempt from many of the more costly, technical aspects of the regulations, such as pen testing and vulnerability assessments, but still must document that they have implemented a security policy and program.

The vast majority of companies are now on the hook to develop an incident response plan and a training program in the next 180 days. Companies must also notify DFS of a security breach within 72 hours and have a CISO or a similar person responsible for protecting private data. The breach-notification portion requires companies to start the clock on notification from the time they have determined that a breach would cause material harm to the business.

By one year from today, companies must also demonstrate that they have pen testing, risk assessment, and multifactor authentication practices in place. In 18 months, they must have developed audit trail capabilities, application security, data retention (five years for financial, three years for non-financial), and encryption. The DFS requirements for third parties will be phased in over two years.

David Murray, chief business development officer at Corvil, says the vast majority of the large banks and financial institutions are well on their way to having implemented many of the best practices outlined by the DFS regulations.

While smaller hedge funds, retail banks, and credit unions have expressed concerns that implementing these security technologies will be too costly, he points out that many of these companies already have security analytics technologies that provide visibility into their operations.

“What we’re saying is that you can start by getting a better read on what’s happening within your organization and you don’t necessarily have to spend more money and time deploying new technology,” Murray says. “We see this as pushing companies to be more proactive, because they are now tracking incidents and attacks versus just looking for a piece of malware.”

Tripwire’s Erlin adds that the strength of these regulations will be to what extent they are enforced. He points to recent cases where New York’s DFS fined Deutsche Bank $425 million and Mega Bank $180 million for violating state money-laundering laws.

“While those fines are not related to cybersecurity, it does indicate that the agency is capable of imposing those type of fines and that they actually might do it,” he says. 

Related Content:

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Article source: http://www.darkreading.com/risk/new-cybersecurity-regulations-begin-today-for-ny-banks/d/d-id/1328295?_mc=RSS_DR_EDT

Malware Kits, Advertising Trojans Drive Mobile Risk

Kaspersky Lab research and INTERPOL analysis highlight growth in advertising Trojans and mobile malware kit sales on the Dark Web.

The Dark Web is a growing hotspot for transactions involving mobile malware kits, which make it easier for threat actors to target victims, according to a new mobile malware report from Kaspersky Lab.

In 2016, Kaspersky Lab detected 8,526,221 malicious installation packages, three times the amount it found in 2015, the report states. Researchers also found 128,886 mobile banking Trojans and 261,214 mobile ransomware Trojans.

Kaspersky Lab’s report included insight from specialist officers working with INTERPOL’s Global Complex for Innovation. They found the Dark Web continues to appeal to hackers doing illicit business, due to its anonymity, low prices, and client-focused strategy.

In their investigations of mobile malware platforms, INTERPOL experts found mobile malware is increasingly sold on the Dark Web in the form of software packages, individual products, sophisticated tools, or smaller-scale tools as part of a “Bot as a Service” model.

The rise in mobile malware kits is not new, explains Kaspersky Lab security expert Roman Unuchek. These kits have grown in popularity as mobile malware becomes more available, and less expensive, on the Dark Web.

“Some of this malware was available in 2014 and 2015, but this year we saw it much more,” he says. “It’s easier for regular people who want to steal money to go to the Dark Web, go to forums, and buy kits to infect users.”

Mobile malware kits can include phishing pages, remote access Trojans (RATs), or hacking software bundles that contain forensic and password-cracking tools. Both individual and packaged malware tools often come with how-to guides for hacking popular systems like Android and iOS.

The biggest trend of 2016 was a rise in malicious programs, particularly advertising Trojans capable of exploiting super-user privileges, according to Kaspersky Lab’s mobile malware report. This trend is unrelated to the increase in mobile malware kits, says Unuchek, but it’s dangerous news for both consumers and businesses. The rise of BYOD makes it tough to track activity of malicious apps.

“[Cybercriminals] can use vulnerabilities in the system to get additional rights,” explains Unuchek. “They can do anything on the device. It’s a major problem because after a user’s device becomes infected, it’s almost impossible to use it.”

Root privileges enable hackers to secretly display ads, install malware and advertising apps on infected devices, and buy apps on Google Play. The malware installs its modules in the system directory, complicating treatment, and some Trojans can infect the recovery image, meaning a restore to factory settings won’t fix the problem.

To gain super-user privileges, threat actors use vulnerabilities that are typically patched in newer versions of Android. They are taking advantage of the fact that most users don’t receive OS updates and remain open to older, readily available exploits. Further, cybercriminals are looking for different ways to bypass protection mechanisms created for Android.

Unuchek anticipates we will most likely see the continued growth of advertising Trojans in 2017. As the mobile space is getting crowded for cybercriminals, and they begin to explore opportunities outside it, he also expects 2017 could bring major attacks on the IoT launched from mobile devices.

Related Content:

Kelly is an associate editor for InformationWeek. She most recently reported on financial tech for Insurance Technology, before which she was a staff writer for InformationWeek and InformationWeek Education. When she’s not catching up on the latest in tech, Kelly enjoys … View Full Bio

Article source: http://www.darkreading.com/mobile/malware-kits-advertising-trojans-drive-mobile-risk-/d/d-id/1328298?_mc=RSS_DR_EDT

MWC: IoT security message drowned out by noise of nostalgia

Naked Security is reporting this week from Mobile World Congress in Barcelona

It’s a strange Mobile World Congress (MWC) indeed when there appears to be significantly more interest in the rebirth of a 17-year-old feature phone than there is in the latest products from the likes of Sony and LG.

But that appears to be the case this year with the launch by HMD Global, which licenses the iconic Nokia brand name, of the remixed Nokia 3310. The has certainly been an attention grabber, perhaps because of the nostalgia it has generated among the many attendees old enough to associate this model with their lost youth.

Others are getting in on the act: yesterday Yuanqing Yang, the CEO of Lenovo, which owns another legacy brand, Motorola, said that he did not rule out re-launching a device of similarly nostalgic appeal, the Razr smartphone. Strange days indeed.

Other attention-grabbing areas at MWC include such obvious candidates as virtual reality (VR), drones and consumer robotics, though it’s easy to come away from many of these displays with the impression that interest is quite shallow and that few manufacturers are likely to see significant revenue generated as a result. Still, it makes for a nice spectacle.

One more substantial trend is the growing presence of automakers such as Jaguar Land Rover and Ford, who are demonstrating their in-car connectivity solutions. Clearly indicating the growing importance of the connected vehicle segment, many vendors, such as Cisco Jasper, now describe the connected car as easily the most important of the many Internet of Things (IoT) segments.

Meanwhile, other growth areas are not quite so obvious. A good example of this is the IoT module makers, whose rapidly increasing presence at events such as MWC is matched only by their lack of ostentation: while it’s the VR demos that get most of the crowds, the actual deals are being done on the modules.

Telit, provider of what it claims is the industry’s broadest portfolio of integrated products and services for end-to-end IoT deployments, has a particularly strong presence at the show, focusing on high potential areas such as industrial IoT rather than on the more consumer-friendly segments such as the connected home.

It’s also noticeable how many vendors are pushing the IoT security message, including names such as F5 Networks, which many would not immediately associate with this competence.

In the wake of high-profile recent attacks, vendors such are clearly pushing the vulnerability of the IoT to DDoS attacks, noting the lack of security inherent in many connected products.

Mobile security is another significant theme at the event, with vendors such as Allot stressing their expertise in this field and pushing new models like security-as-a-service. So while it may generate fewer headlines, and cannot easily compete with the new trend of phone nostalgia, security could in fact be the bigger story here at MWC.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/VkrCExEBcag/

Palo Alto Networks buys LightCyber for $105m

Palo Alto Networks has acquired smaller cyber security firm LightCyber for $105m in cash.

LightCyber has developed technology that uses machine learning to identify hacker and malware-based attacks based on identifying behavioural anomalies inside deployed networks.

Palo Alto Networks plans to integrate LightCyber’s technology into its security platform by the end of the calendar year. It has promised to support existing LightCyber deployments in the meantime. “Bringing behavioral analytics to the platform will enhance its automated threat prevention capabilities and the ability for customer organizations to prevent cyber breaches throughout the entire attack life cycle,” Palo Alto said in a statement on the acquisition. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/01/palo_alto_buys_lightcyber/

Speaking in Tech: A chat with Web 2.0 MySpace worm dude Samy Kamkar

Podcast

speaking_in_tech Greg Knieriemen podcast enterprise

Ed Saipetch and Peter Smallbone steer the podcast this week with very special guest Samy Kamkar of Samy worm fame, a world renowned privacy and security researcher, computer hacker, whistleblower and entrepreneur.

The details…

  • 2:15 Samy’s Myspace worm
  • 8:27 Curiosity
  • 9:49 Skyjack – Hijacking drones
  • 16:13 PoisonTap – Sniffing all the traffic
  • 19:15 How to hack
  • 22:28 Google’s SHAtter attach on SHA-1
  • 27:49 AI disrupting Intel
  • 35:39 Waymo suing Uber and Otto
  • 39:00 Hacking Autonomous Driving
  • 43:47 Are open systems safer?

Listen with the Reg player below, or download here.

Speaking in Tech: Episode

Podcast Subscriber Links

Subscribe through iTunes

Subscribe through Google

Subscribe through Stitcher

Feed URL for other podcast tools – Juice, Zune, et cetera: http://nekkidtech.libsyn.com/rss

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/01/speaking_in_tech_episode_250/

Vice News YouTube commenter set for retrial over ‘menacing’ posts

A man under police surveillance who was cleared of criminal offences after leaving unpleasant comments on YouTube will be tried again after the Director of Public Prosecutions got his acquittal overturned.

Kingsley Anthony Smith, a 19-year-old of Woodbridge Close, Luton, was cleared of four charges of breaking Section 127 of the Communications Act 2003 after using his Google+ account to leave comments under news videos.

The Metropolitan Police’s Anti-Terrorist Command was monitoring Smith because they said he was attending “extremist Islamic fundraising events”. Police searched for him online and found a video where he described his “return to Islam”, which led them to Smith’s Google+ account.

The four comments that got Smith hauled into Luton Magistrates’ Court in September last year included “If I see Paul Golding, I’d slice his throat” under a Vice News video titled “London’s Holy Turf War” and featuring the leader of far right anti-Islam group Britain First.

Another video from Vice News titled “The Islamic State” attracted the comment “Allahu Akhbar, kill the Kuffir” from Smith. Under another video, not by Vice, titled “David Cameron Exposed on Islam” and featuring the former prime minister pleading for religious tolerance, Smith wrote: “I’m going to put an IED [improvised explosive device] on your doorstep.” Underneath a fourth video titled “British Military Power” Smith said: “One day I will kill the kuffir, Allahu Akhbar.”

District Judge Leigh-Smith cleared Smith of the four charges of “sending by means of a public electronic communications network a message or other matter that was grossly offensive or of a menacing character.” He referred to the Twitter Joke Trial of 2012, where someone joked on the social network about blowing up an airport and was prosecuted.

Judge Leigh-Smith found that the messages did not create menace, “fear or apprehension in those to whom they were communicated,” adding: “I noted the extreme lack of expedition with which the police actioned their discovery of these threats. There was no evidence of any action being taken regarding them, other than in this prosecution. There was no evidence that anyone complained, that anyone was angered or upset, or indeed encouraged to act.”

The Director of Public Prosecutions (DPP) then stepped in, appealing against Smith’s acquittal on three grounds: that his comments genuinely were menacing; that they were grossly offensive; and that Judge Leigh-Smith got the law wrong by using the police’s lazy response as proof the messages were not genuinely menacing or offensive.

Mr Justice Sweeney, sitting in the Administrative Court, agreed with all of the DPP’s points in a judgement published last week. Along with Lord Justice Irwin he ordered Smith’s case to be sent back to Luton Magistrates for retrial before another judge. Mr Justice Sweeney said: “The messages were clearly not a joke… It was perfectly reasonable for the police to prioritise other cases, and there was evidence that taking down things that were posted online was very difficult.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/01/kingsley_smith_vice_news_youtube_commenter_kill_kuffar_posts/

Infosec white-coats: Robots are riddled with software security bugs

Common security flaws in mainstream robotic technologies leave them wide open to attack, infosec researched have warned.

IOActive made the admonition after evaluating the security of multiple home, business, and industrial robots. The array of vulnerabilities identified in the systems evaluated included many graded as high or critical risk, leaving the robots susceptible to cyberattack.

Hackers might be able to abuse the flaws to maliciously spy on owners via the robot’s microphone and camera, leak personal or business data, and in extreme cases, even cause “physical harm or damage to people and property in the vicinity of a hacked robot”, according to IOActive.

IOActive’s white coats Cesar Cerrudo and Lucas Apa tested mobile applications, robot operating systems, firmware images, and other software over the last six months in order to identify the flaws in several robots from vendors, including SoftBank Robotics, UBTECH Robotics, ROBOTIS, Universal Robots, Rethink Robotics, and Asratec Corp.

Cerrudo explained why the two researchers had taken up the ongoing study: “Robots will soon be everywhere – from toys to personal assistants to manufacturing workers – the list is endless,” he said. “Given this proliferation, focusing on cybersecurity is vital in ensuring these robots are safe and don’t present serious cyber or physical threats to the people and organisations they’re intended to serve.”

IOActive has discovered 50 cybersecurity flaws (many of them common problems) across six of the biggest robotics brands and manufacturers, including:

  • SoftBank Robotics: NAO and Pepper robots
  • UBTECH Robotics: Alpha 1S and Alpha 2 robots
  • ROBOTIS: ROBOTIS OP2 and THORMANG3 robots
  • Universal Robots: UR3, UR5, UR10 robots
  • Rethink Robotics: Baxter and Sawyer robots
  • Asratec Corp: Several robots using the affected technology

The problems identified in the home, business, and industrial robots ranged from insecure communications and authentication issues, to weak cryptography, memory corruption, and privacy problems.

A research paper published on Wednesday, Hacking Robots Before Skynet, outlines security precautions that should be taken by robotic vendors to improve the security of robots, including implementing the Secure Software Development Life Cycle methodology, encryption, security audits, and more.

All vendors included in the paper were alerted to the various specific vulnerabilities identified within their products many weeks ago in the course of responsible disclosure.

Specific technical details of the vulnerabilities identified will be released at the conclusion of the disclosure process when vendors have had adequate time to address the findings, according to IOActive. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2017/03/01/robots_security_vulns/

Palo Alto Networks Acquires LightCyber

Company will integrate LightCyber technology into its Next-Generation Security Platform.

Network security company Palo Alto Networks (PAN) has acquired behavioral analytics firm LightCyber for $105 million in what it says will help expand its automated threat prevention capabilities. PAN will continue to offer LightCyber products and provide support to existing customers while, at the same time, integrating the company’s technology into its Next-Generation Security Platform.

Gonen Fink of LightCyber says: “We are pleased to join the Palo Alto Networks team, combining our technology innovations and accelerating adoption of behavioral analytics to help organizations bolster their defenses against the advanced and sophisticated adversaries they are facing today.”

Palo Alto Networks expects to increase its ability to detect anomalous behavior with the addition of LightCyber’s technology.

“The LightCyber team’s vision to bring automation and machine learning to bear in addressing the very difficult task of identifying otherwise undetected and often very sophisticated attacks inside the network is well-aligned with our platform approach,” says Mark McLaughlin of Palo Alto Networks.

For details, see the acquisition announcement.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: http://www.darkreading.com/perimeter/palo-alto-networks-acquires-lightcyber/d/d-id/1328289?_mc=RSS_DR_EDT