Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / IOT / IoT hackers will be welcomed with a warm deception: It’s crazy simple!

IoT hackers will be welcomed with a warm deception: It’s crazy simple!

January 28, 2020 by cbn Leave a Comment

At the time of writing, Iran threatens to be thoroughly hacked off with us. Are we really on the brink of World War Three, asks freelance technology writer, Nick Booth? Remember the new combat will feature cyber conflict – it’ll be WW IoT.

We will fight them on the beaches. Well, we would if we’d changed the default passwords on the security cameras!

Are you ready for electronic engagement with the enemy? All our vital industries seem to be hostage to an unsecured IoT. Apparently, you can’t have a digital transformation without a legion of dumb devices on default passwords. Our battalions of netbots could easily turn against us, with just a few commands from a fanatical enemy’s keyboard. Now that’s global disruption.

At a time of conflict we suddenly turn to all those military experts whose unfashionable opinions we can’t normally tolerate.

Nothing left to chance

William (Tony) Cole CTO of Attivo Networks, is one such character. As a veteran of the US Army he will have been drilled to think the opposite of civilian networkers. Unlike us, he will leave nothing to chance. In the US Eighth Army – his formative employer – they say assumption is the mother of all cock-ups. Later, his time engaged in Land Information Warfare Activity ingrained the thinking that ‘assume’ makes an ‘ass’ of ‘u’ and ‘me’. I didn’t ask about the work he did in the Pentagon or he might have shot me.

On leaving the military, Cole’s tactical cunning needed to find the right outlet. It’s always hard to adjust to civilian culture and Cole had a struggle to find the right berth for his trap-setting skills. Ironically, nobody is better at neutralising enemies, but the potential clients are oblivious to Cole’s techniques since they were learned in relative secrecy while he served in the military. Symantec saw no value in the Honeypot expertise that Cole showcased – he was too far ahead of his time. McAfee didn’t bring out the best in him either. When Cole mentioned ‘FireEye burn out’ I didn’t want to press him too hard on what was clearly a painful memory.

However, two years ago he and Attivo Networks found each other in the same trench. They saw the incoming hordes through the same binoculars. Cole was enthused at the deception weaponry that Attivo had designed for the Internet of Things (IoT). 

Use your opponents’ momentum

Cole’s years in the Pentagon and the army told him that sometimes in combat, it is better to use the opponents’ momentum and steer them into a bad place. Like a Navy Seal grabbing an incoming assassin, then somersaulting them towards the ground by means of a subtle twist of the wrist, Attivo’s deception software can break its opponent by using its momentum against itself.

If, for example, an enemy launches an attack on a health service network, it is probably impossible to stop them getting in. There are too many ‘traitors’ such as unsecured thermometers, blood pressure takers and oxygenation readers. Once ‘turned’ they offer the enemy the option to do anything – from stealing the entire patient database to fatally shutting down a VIP’s infusion pump.

Attivo builds an entire decoy environment that convinces the invaders that they have achieved their objective. Did Attivo nick this idea from Britain’s counter intelligence allies in World War II? During the last century the British built a fake double agent spy network that deceived the enemy in a similar way. Operation Bodyguard falsely mapped out what proved to be a picture of fatally misleading intelligence that the Germans acted upon. Typical Americans, commercialising our ideas! 

Crazy simple!

The challenge for the IoT is that Deception Management needs to drastically arrest the movement of the invading hackers. These days the process of  detecting, deceiving and deactivating them has to be sped up by about 98%, according to Cole.

“Deception is crazy simple,” says Cole. The hard bit is convincing the IoT’s own logistics corp. As with their army counterparts, they can be slow to move sometimes.

The author is freelance technology writer, Nick Booth.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: IOT, SECURITY

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025
  • Protecting Azure Infrastructure from silicon to systems

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,321)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in