A look at some of the top stories from this past week in the world of automotive, IoT, Industry 4.0, and Enterprise Edge cybersecurity.
New US IoT Law Proposed to Help Prepare Country’s Infrastructure for IoT Revolution (Geek Wire)
As the IoT revolution picks up speed, Rep. Suzan DelBene (D-WA) introduced legislation this week to help prepare the country’s infrastructure to cope with the spike in connected devices. “The United States can’t afford to wait around while other countries are implementing IoT readiness plans,” DelBene said in a statement.
Was a Spy Satellite Downed by Hackers? (Forbes)
The two French-built Falcon Eye satellites crashed shortly after takeoff in the United Arab Emirates earlier this month, amid growing tensions between the UAE and Iran. The crash came after a report was released that stated that US and NATO systems are vulnerable to cyberattack, and shortly after the US Army Cyber Command reportedly disabled part of the Iranian Revolutionary Guard’s air defenses with a cyber attack.
Hackers Could Seize Your Hair Straightener and Torch Your House (Pen Test Partners)
Careful with that connected hair straightener - Pen Test Partners this month found that a connected hair straightener had no security gate between it and the mobile app. The flaw means that anyone within range of the device can override the settings, increasing the temperature to well over 400 degrees Fahrenheit. That’s gonna be a bad hair day, to say the least.
Big Payday for White Hat Hacker Who Found Vulnerability in Tesla Model 3 (Security Week)
Sam Curry said he found the flaw while using the Tesla mobile app to arrange a repair. Curry reported the issue to Tesla and was awarded several thousand dollars by the company. The flaw could potentially be used by a hacker to modify information about cars.
How Lithuania Became a Cybersecurity Powerhouse (Fifth Domain)
The Global Cybersecurity Index ranked the small Baltic country behind only the United States, United Kingdom, and France in cybersecurity preparedness. How’d they do it? By placing cybersecurity under the authority of the Ministry of National Defense and by constructing a secure state data-transfer network, among other measures. The country’s Ministry of National Defense said that critical information infrastructure and government networks remain the most attacked sectors by malware.