Daily Video: Home Security Systems Aren't Secure, HP Claims

Hewlett-Packard has conducted a study on Internet-enabled home security systems that found that the security systems themselves are insecure.

Daniel Miessler, practice principal at HP Fortify stated that the major finding was that 10 out of 10 systems could be brute-forced to extract usernames and passwords via the Internet.

A brute-force attack is one in which an attacker repeatedly tries different combinations of access credentials to get control of a device. With the home security systems, the usernames and passwords are used by mobile apps to be able to view and manage home security remotely. With that access, an attacker could identify if a user is home or not.

ARM officials announced on Feb. 9 that the chip maker was buying Offspark, a Dutch company that specializes in securing software for devices and sensors on the Internet of things.

Offspark's PolarSSL technology, an embedded open-source Transport Layer Security technology, is already used in such devices as sensor modules and smartphones. ARM officials said it will be the foundation of the vendor's strategy around mbed communication security and software cryptography.

Qualcomm, the world's largest mobile chip maker, will pay a $975 million fine and make changes to its business practices in China to settle an antitrust investigation that had dogged the company for more than 14 months.

Qualcomm officials announced the settlement Feb. 9, saying that while they disagreed with the country's National Development and Reform Commission—essentially China's anti-monopoly agency—which found that the chip maker had violated China's 2008 antitrust laws, they will not dispute the investigation's findings or pursue further legal action.

Fujitsu is focusing on energy efficiency with new rack and blade servers. The two new Primergy systems are designed to offer businesses the compute capabilities they need in hardware that fits into data centers that are limited in how much they can expand.

The new systems take into account businesses that need to increase the compute capabilities in their data centers, even though there may not be much, if any room, to expand the facility. The companies are left to figure out how to squeeze more performance out of their existing data centers.

Top White Papers and Webcasts