BringYourOwnIT.com

Information Security, Mobile Security and the Internet of Things

  • *** Top Posts ***
  • YouTube
  • Twitter
  • About
Posts Comments
  • Papers
  • RISC-V
  • IoT Security
  • Mobile Security
  • Information Security

Major home gateway flaw tells us it’s time for hardware-level security

May 25, 2015 1 Comment

This week, security researchers found a major vulnerability affecting scores of home and SOHO Wi-Fi router products from over 20 of the biggest names in the market. That such a widespread flaw could go unnoticed and that it went unpatched for so long despite the researchers’ best efforts is a sad reflection on the commercially minded “sales first, security second” attitude of the technology industry and of the gaping holes that exist in the supply chain.

But it also raises questions about whether, instead of focusing on security at the software and network level, we should instead start looking down to build protections into the silicon in order to reduce the attack surface area.

Read more of this post

Filed under IoT Security, Top Posts Tagged with Cesare Garlati, corporate data, flaw, hack, home gateway, login, password, patch, Security, virtualization, vulnerability, Wi-Fi router

About Cesare Garlati

Follow Cesare on YouTube

This is my personal blog about disruptive technology trends such as cyber security, open source processors, and the Internet of Things. It's full of my reasoned opinions, some of which will turn out to be absolutely wrong. You should not rely on anything in this blog for any reason other than for amusement.

This blog occasionally quotes excerpts from other publications, in which case it is done under Fair Use. I despise copyright trolls and think the EFF is due for sainthood any day now.

I am the founder of Hex Five Security and an active member of the RISC-V Foundation: some of my writing will appear here too if it's relevant. The opinions here are mine and mine alone, and are not representative of any professional organizations I belong to.

Comments are unmoderated. Say what's on your mind, be direct, speak the truth, etc., I'll try to keep all your comments ...

Happy reading!

Twitter @CesareGarlati

  • David Patterson: Examining the Top Five Fallacies About RISC-V @risc_v design-reuse.com/news/53202/exa… posted 1 month ago
  • RT @hex_five: Learn how to quickly develop high-grade security applications with built-in remote firmware updates, telemetry, and device mo… posted 6 months ago
  • Congrats to team and investors! twitter.com/hex_five/statu… posted 1 year ago
  • New release of MultiZone Security for RISC-V available! v2.2.0 includes important security updates, secure DMA tr… twitter.com/i/web/status/1… posted 1 year ago
  • RT @hex_five: Ex US Navy TOPGUN @GuySnodgrass and Hex Five's founder @CesareGarlati on strategies and tattics for the cyber domain - a @Tie… posted 1 year ago
Follow @CesareGarlati

Recent Posts

  • Cybersecurity: What You Need to Know and Do to Protect Yourself and Your Business
  • Secure IoT Firmware For RISC-V Processors
  • Secure IoT Firmware For Cortex-M Processors
  • A Clean Slate Approach to Linux Security RISC-V Enclaves
  • Multi Zone Security for Arm Cortex-M Devices
  • RISC-V Open Source Processors Ready For Prime Time
  • A New Zero-Trust Model for Securing Embedded Systems
  • Trusted Execution Environments – A System Design Perspective
  • Maintaining Security in a Heterogeneous and Changing World
  • User Mode Interrupts – A Must for Securing Embedded Systems
Follow CesareGarlati on Twitter
View Cesare Garlati's profile on LinkedIn

Blog at WordPress.com.

  • Follow Following
    • BringYourOwnIT.com
    • Join 358 other followers
    • Already have a WordPress.com account? Log in now.
    • BringYourOwnIT.com
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...