Cybersecurity Advice (for the AV Industry) from Robert Mueller

cybersecurity-0819.png

By Paul Konikowski On June 24, 2019, former Special Counsel Robert Mueller III testified before the House Judiciary Committee and the House Intelligence Committee about his team’s Report on the Investigation into Russian Interference in the 2016 Presidential Election. Throughout most of the day, Mueller kept his answers brief and referenced the report. Oftentimes, he […]

Read more

Friction, SB-327 and Zoom’s Terrible, Horrible, No-Good Week

zoom-room-0719.png

Last week was an eventful one for Zoom. In less than twenty-four hours, we had: The revelation of multiple security vulnerabilities in the popular Zoom conferencing software A [now updated] defensive statement by Zoom, dismissing concerns related to same Public outcry A reversal of course and introduction of an immediate patch for one vulnerability and […]

Read more

Cybersecurity Lessons Learned from Zoom, Logitech and Draper

irvan-smith-5eBW5GomfhY-unsplash-0719.png

By Paul Konikowski, CTS-D Last week was a big week for cybersecurity news pertaining to the audiovisual industry. Vulnerabilities in Zoom’s Mac desktop client were disclosed, hijacking flaws in Logitech’s Unifying USB dongles hit the mainstream and Draper, Inc. announced that its computer systems and communications networks were being held hostage by ransomware. Let’s take […]

Read more

Imminent Disaster  —  The Looming AV Threat

bridge-lock-0619.png

I want you to imagine a 46″ flat panel display. This display is in a staff cafeteria on the 30th floor of an office building. Wall-mounted. It is not an extravagant display, probably 1080p… not even smart (gasp!). You’ve seen one just like it, looping special events and other corporate propaganda. Now I want you […]

Read more

Cybersecurity and the Problem with OEMs

oem-partners-0519.png

Last year, Crestron was the focus of some cyber activists who found vulnerabilities in Crestron touch controllers that could theoretically allow someone to use touch screens to spy on the person in the same room. This was covered in a class at a hacktivist conference called DEFCON and subsequently was written up in WIRED Magazine. […]

Read more

Security Through Light: The World’s First Quantum Secured Video Conference

one-time-pad-1218.jpg

My readers will know that I tend to focus on topics related to collaboration, user-interaction, and generally building products that help us work together. You may be surprised to learn that a significant amount of my time is spent thinking about security. As devices become increasingly attached to our enterprise networks – those same devices must be […]

Read more

Rohde & Schwarz Ships R&S SpycerNode Media Storage System

RohdeSchwarz-SpycerNode.jpg

R&S SpycerNode uses what Rohde & Schwarz calls High Performance Computing (HPC) file system for its media server. HPC employs redundancy using software-based “RAID” technologies called erasure coding in combination with declustering to increase overall performance and reduce rebuild times. R&S SpycerNode features Rohde & Schwarz‘s device manager web application which makes it much easier […]

Read more

The Art of Hacking AV Systems

HackingAV.png

There are quite a few conferences that focus on AV equipment. On the consumer side, there is CES, on the broadcast side there is NAB, then for residential AV there is CEDIA Expo and for commercial AV, we have InfoComm. The latest conference to focus on AV equipment, however, happened Friday, August 10th. The conference? DEFCON. […]

Read more

Why Are We Not Talking About Digital Signage Security?

cybersecurity-0818.jpg

By Viktor Petersson Screenly Over the last few years, we have seen many cases of digital signage players being hacked for fun, profit and even propaganda. Hardcore porn shown on hacked billboard in Malmö Cyberattack claims multiple airports in Vietnam Hacked digital signage displays porn in Union Station Hijacking the Outdoor Digital Billboard – By […]

Read more

AVIXA Releases Recommended Practices for Security in Networked AV Systems

avixa.jpg

Audiovisual systems are becoming increasingly central to global operations as they offer expanded remote management capabilities. This upward trend of AV systems operating over enterprise networks can pose a serious risk for security breaches, therefore it’s critical for AV professionals to understand and mitigate these risks. AVIXA’s new Recommended Practices for Security in Networked AV […]

Read more

The Risks of IoT

aeiforiatechnos.png

A quick survey: How many IoT devices do you currently think you own? Chances are you are way off on the actual number. A main reason is that no one actually knows how many devices are currently connected to the Internet of Things and that number is even harder to predict moving forward as more […]

Read more

All Data Is Consequential

tinerstake-apple-feat-1015.jpg

As the world moves further and further into a technology-enabled and -dependent world, serious questions arise about personal and institutional privacy. Recently, news headlines have revealed that a seemingly innocuous bit of data could have far reaching and deadly side effects. Over the past several years, the U.S. Army has issued fitness trackers to its […]

Read more

A Funny Thing Happened on the Way to the Software Revolution

workflow-0917.jpg

I’ve written time and again about the rise of software as opposed to dedicated hardware. About AV as a Service (AVaaS). About how all of those black and grey boxes we’ve come to know and love will soon disappear, to be replaced by services running on virtual machines. It isn’t just a rule about audiovisual, […]

Read more

Holey IoT!

featured-aeifora.jpg

InfoComm is rapidly approaching and I am sure that there will be many gizmos and gadgets that are IoT ready as offerings in both consumer and commercial technology continue to explode in the market. The Internet of Things (IoT) play space has been promising, and delivering, on new and exciting ways to engage with customers, […]

Read more

What AV Integrators Should Know About WannaCrypt

Cyber-Security-0117.jpg

This story has been updated to include advice from security expert and X2Go project lead Stefan Baur. Last week, a group of hackers released a nasty piece of ransomware that quickly spread across the world, touching anything and everything connected to a network. Deemed WannaCrypt (or WannaCry), the ransomware infected thousands (approximately 200,000, according to […]

Read more

Z-Wave Alliance Ups Security Requirements for All Z-Wave Certified IoT Devices

arming-1116.jpg

The Z-Wave Alliance has adding a security requirement to its long-standing interoperability certification. This addition to its certification program will require manufacturers to adopt the strongest levels of IoT security in the industry. The Alliance Board of Directors has voted to make the implementation of the new Security 2 (S2) framework mandatory for all products […]

Read more

I’m Just a Bill…

identity-theft-online-0716.png

As I sit here in Cleveland during the Republican National Convention, I’m thinking about something I did not ever expect to happen in this current political climate — a recent bipartisan bill was introduced into the House of Representatives [Rep. Gene Green (D-TX) and Rep. Paul Cook (R-CA)] that aims to stop the flow of […]

Read more

USB 3.0 Promoter Group Updates USB Type-C to Solve Bad Charges and Malware

apple-watch-event-2015-0176-0416.png

The USB 3.0 Promoter Group today announced the USB Type-C Authentication specification, defining cryptographic-based authentication for USB Type-C chargers and devices. Using this protocol, host systems can confirm the authenticity of a USB device or USB charger, including such product aspects as the descriptors/capabilities and certification status. All of this happens right at the moment […]

Read more

A Byte of Apple

backdoor_feat0825.png

By now you should have heard about Apple’s battle with the federal government over the unlocking of Syed Rizwan Farook’s iPhone for use in the investigation of the San Bernardino shootings. If you have not been paying attention and you work in the ICT industry, you should. In short, the Federal Government has secured an […]

Read more