Video: All of the Ways that BlackBerry Software Impacts the Enterprise of Things

From the 60 million cars on the road running BlackBerry software, to the 80+ security certifications we have earned, to the 20,000+ enterprises that rely on our software, BlackBerry secures, connects, and mobilizes businesses all around the world today. Watch this video to learn more.

Source: WhatsApp for BlackBerry 10 support officially extended until the end of 2017

Share

Will the Internet of Things always be so vulnerable?

The Internet of Things (IoT) has undergone an amazing transformation, from a pipe dream to a marketing buzzword, and now an impending reality. Recent estimates expect the number of internet-connected devices to reach 26 billion by 2020, with some studies suggesting an even higher output. With an exponential increase in devices communicating with us, other devices, and with the internet at large, how can anyone keep private information safe? …

In 2015, more than 165 million personal records were exposed, through cybersecurity breaches over the course of the year. A staggering 64 per cent of Americans have been personally affected by a major data breach. It’s no longer a question of “if” cyber criminals will target you — it’s a matter of “when.”

Cyberattacks have not only become common, they’ve also become exponentially more dangerous, as we connect more and more of our devices to global networks. The large majority of cybersecurity professionals are concerned about the potential weaponisation of IoT, and only 30 per cent of them believe their organisations are fully prepared for the risks inherent in IoT. Furthermore, experts feel only one out of every ten IoT devices has adequate security measures. …

Source: Will the Internet of Things always be so vulnerable?

Share

Is Everything Hackable In The Internet Of Things?

The impact of the Mirai botnet has raised concerns about the internet of things, but saying everything is hackable is misleading. There are manufacturers focusing on IoT for consumers that take security seriously, though I’ve noticed that they are the minority.

From what I’ve seen, some of those manufacturers have internal security programs including application and product security teams, incident response teams, bug bounty programs and public documentation for researchers and consumers. But others only have a few – or even none at all.

Many IoT devices lack basic security controls, and assume that the network or router is responsible for defense. This is caused by lack of security awareness among manufacturers. These manufacturers are building devices and then branding (white labeling) them with their customer’s brand. For example, many of the devices that were used in the Mirai botnet came from one manufacturer, but they were sold by many other companies. …

Source: Is Everything Hackable In The Internet Of Things?

Share

Hajime IoT malware looks more sophisticated than Mirai

The Mirai malware took control of poorly secured IoT devices, creating a large botnet that was used in a DDoS attack against DNS provider Dyn, which in turn took down a large portion of the internet last year. …

Hajime is yet another malware which is taking over poorly secured IoT devices. However, this malware works in a very different way than Mirai, which also makes it harder to stop.

The Mirai malware takes orders from command and control servers. While this is a typical method used by malware, it also provides a method to combat the botnet. Internet service providers have been cutting off access to these C&C servers when they are found. Hajime doesn’t suffer this weakness.

Instead of using C&C servers, Hajime instead communicates via a peer-to-peer network utilizing tools used in BitTorrent. This makes blocking communications that much harder, if not impossible. …

Source: You Thought Mirai Was Bad? Meet Hajime. – UTB Blogs

Share

Enterprise Webcast Central

On BlackBerry’s new Enterprise Webcast Central you will find a library of informative webcasts regarding topics including End-to-End Security, MDM, IoT, secure Enterprise Software and much more.

Also you can register for upcoming webcasts and updates on this website.

Source: Enterprise Webcast Central

Share

BlackBerry CSO: Medical devices need warnings to stop hackers killing

Hackers are posing a serious threat to human life, with BlackBerry CSO David Kleidermacher urging the healthcare sector to raise the bar when it comes to device security.

Technology is never more integrated with human life than when it is relied upon for healthcare and survival. The healthcare sector is laden with devices, some for simple uses, and others which the heart is reliant upon to keep beating.

A frightening dynamic is formed when combining this truth with the fact that healthcare is rife with cyber security frailty, placing human lives in the line of fire.

David Kleidermacher, Chief Security Officer at BlackBerry told CBR: “What makes the news today are these ransomware attacks and how to protect personal, private healthcare information. While all of that is important, there is another perhaps more insidious risk that doesn’t get as many headlines, as many of these connected devices are connected to people. I don’t want to panic patients, or tell them to stop using devices that are connected to the insulin pumps or the drug dispensing machines, but the vast majority of what we use today is hopelessly insecure.” …

Source: BlackBerry CSO: Medical devices need warnings to stop hackers killing – Computer Business Review

Share

What Do BlackBerry And Tom & Jerry Have In Common?

Over the past three years BlackBerry has gone through a transformation.  We have become a software company, licensed hardware operations and defined a new market category called the Enterprise of Things (EoT).

EoT is a relatively new term to most people, so I will provide some context.  In most industries the enterprise market is bigger than the consumer market; the Internet of Things (IoT) is no exception.  IDC valued spend on IoT in 2016 at $737 billion, with most of that spend occurring in enterprise.  This is why when it comes to ‘Things’, BlackBerry is focused on enterprise.  We call this the EoT market and it is a market that we are uniquely qualified to address and are leaders in today.

For EoT to be successful security is a must have component.  It is the baseline, without which EoT will falter.  No ifs, no buts.  It is a market that requires security as an unequivocal standard.  The stakes are high.  Last year cybercrime cost the global economy $450 billion and over 2 billion personal records were stolen.  Gartner expects that 25% of enterprise security attacks will be because of connected Things by 2020, affecting the company that is compromised and any individuals whose data is involved.

Having said that, the question that is most often asked about connected Things is, whether a securely connected world is really possible?  A securely connected EoT is possible and BlackBerry is already demonstrating how.

At BlackBerry, security has been our number one priority from day one.  With that comes over 30 years of security heritage, security built into our chipsets, a large and growing portfolio of security IP, recognition by industry experts as being the leaders in security, the trust of all of the G7 and 15 of the G20 governments who use BlackBerry software and that is to name just a few proof points of how we make security our DNA.

There is more.  Whilst there is much conversation on the topic of cybersecurity there is no agreed framework of what ‘good’ looks like.  At BlackBerry, we are defining what the cybersecurity standard is.  Without this construct, market adoption of connected Things will be unlikely to grow as forecast, as businesses and individuals will be increasingly guarded about their privacy and data security.

There are of course other unknowns associated with the proliferation of connected Things; security is not the only question.  Another unknown is what connected Things will mean for net neutrality.  This topic is already a hot one, with companies and governments eager to capitalize on the Internet platform that exists even today.  What happens as EoT becomes more widespread, making data more valuable?  We will most likely see a rise in data being exchanged for commercial gain, creating a struggle of network neutrality.  There is also the question of who owns the data; is it the individual, an enterprise or the government?

We are invested in bringing EoT to everyone.  Our solutions are now platform agnostic, so they are not limited to the BlackBerry OS, and we have expanded our proposition so that BlackBerry is not just the smart in smartphones, it is “the smart in everyThing”.  That includes cars, wearables, medical devices, asset trackers and more.  Additive to that our model is scalable, so BlackBerry’s ability to secure, connect and mobilize can be expanded to all endpoints.

Our mission for EoT is to connect all endpoints within the enterprise, enabling frictionless and secure workflows, as enterprises increasingly look for cross-functional integration at the data level.  The BlackBerry Secure platform addresses the connectivity, mobility and security needs of enterprises across markets, including financial, government, legal, medical and auto.  Did you know, for example, that BlackBerry software is in over 60 million connected cars today and we are testing solutions that secure and connect self-driving cars on the road today?

We are committed to making BlackBerry grade security available to everyone, to protect your data and your privacy, without platform or endpoint bias.  In the future, you will see EoT blur with IoT, as frictionless workflows converge with consumer lives, and BlackBerry is ready for that.  It will be work/life balance at its best, with BlackBerry security as the standard.

So to answer the question, ‘Is a securely connected world really possible?’.  Yes it is and, not only is it possible, it is a category that BlackBerry is bringing definition to and providing leadership in.  We recognize that security is a cat and mouse game, requiring constant investment and innovation and that is what we do, day in, day out.

Remember that Tom & Jerry teach us that it is the chase that keeps life interesting.

John Chen

Executive Chairman & CEO, BlackBerry

Source: What Do BlackBerry And Tom & Jerry Have In Common?

Share

How to protect every endpoint in your Enterprise of Things

By 2020, more than 25 percent of identified enterprise attacks will involve the Internet of Things.

Hackers have a new favourite target in the enterprise. They’ve turned their attention from servers to the growing number of devices with connectivity to corporate networks.

You want to maximize your employees’ mobile productivity, but you need to secure the explosion of endpoints with access to your sensitive company data. And don’t forget about safeguarding employee privacy and minimizing complexity for IT.

The new endpoint landscape demands a comprehensive approach to security and management. BlackBerry pioneered the mobile device management (MDM) category, then responded to changing security needs with a cross-platform enterprise mobility management (EMM) solution.

Unified Endpoint Management (UEM) is the next step in this evolution, helping you secure the full Enterprise of Things.

BlackBerry UEM delivers a trusted end-to-end security model and is the only single solution that addresses the full spectrum of potential breaches in an enterprise. It protects your data, everywhere it goes – without compromising productivity. If you want to be BlackBerry Secure, you need BlackBerry UEM.

Find out how BlackBerry UEM secures your enterprise from a single console.

Watch an on-demand webcast of why mobile devices are today’s biggest enterprise security threat.

Source: How to protect every endpoint in your Enterprise of Things

Share

Mirai is the hydra of IoT security: too many heads to cut off

Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any headway.

The malicious code became publicly available in late September. Since then, it’s been blamed for enslaving IoT devices such as DVRs and internet cameras to launch massive distributed denial-of-service attacks, one of which disrupted internet access across the U.S. in October. …

Source: Mirai is the hydra of IoT security: too many heads to cut off | PCWorld

Share

4 ways cyber attackers may be hacking your IoT devices

Many (too many) of the connected devices that make up the Internet of Things (IoT) are extremely easy to hack. New IoT devices are being designed and released every day — from consumer items, like light bulbs and automobiles to industrial equipment, like drones and entire power plants. But many of these devices are built little-to-no security in place.

“IoT devices are simply computers and can be hacked in any ways that a traditional computer could be hacked,” says Patrick Wardle, director of research for Synack, a cybersecurity company. Even more alarming, because IoT devices are often connected directly to the internet, they can be accessed by attackers all over the world, explained Wardle. …

To know more about what the worst-case IoT security scenarios are, here are a few common ways that attackers are hijacking IoT devices:

  1. Mass vulnerability probing …
  2. Exploiting universal Plug-and-Play (uPNP) …
  3. Intercepting the cellular network …
  4. Reverse-engineering firmware …

Source: 4 ways cyber attackers may be hacking your IoT devices

Share