Security
Reinforcement learning in IoT security
Reinforcement learning is a type of machine learning where an agent learns how to behave in an environment by performing actions and receiving feedback in the form of rewards or penalties. The agent aims to discover the best strategy or policy to maximize the cumulative reward over time. It involves making a sequence of decisions in an environment, learning from the outcomes of those decisions, and adjusting its strategy accordingly.
Reinforcement learning is often used in scenarios where an agent interacts with an environment and learns by trial and error, gradually improving its decision-making skills.
IoT Insider published an explainer on reinforcement learning and its applications to IoT security. This could bode well for those trying to keep up with evolving cyber breaches.
Read more here.
IoT
IoT deals and partnerships
November was a big month for cooperation.
- Samsung and O₂ Telefónica will test new cloud-native network architectures in Germany.
- The Raspberry Pi also got a shot in the arm in the form of a strategic minority investment by Arm Holdings.
- Seoul Robotics, ALP.Lab Partner on 3D perception technology
And those are just a couple of the major IoT partnerships coming down the pipeline.
Read more here.
Cybersecurity
Siemens and Ericsson warn against EU cybersecurity rules
Updated cybersecurity laws are always great, right? Maybe not – if you listen to Schneider Electric, Siemens, and Ericsson. All three came out swinging against the EU’s new regulatory proposal, citing possible supply chain problems.
“We risk creating a COVID-style blockage in European supply chains, disrupting the single market and harming our competitiveness,”
Read more here.
TECHNOLOGY
How to use NFC technology to eliminate smart lock battery issues
Smart locks are increasingly common. But time has shown that they’re not so smart when they run out of juice. NFC energy harvesting tech could rewrite this tragic tale as a low-power success story.
Long story short, NFC eliminates the need for traditional batteries in smart locks, offering a more sustainable and reliable solution for secure access control in the Internet of Things ecosystem.
Read more here.
Cybersecurity
News resources to fight cybersecurity
What about utilizing news resources as a cybersecurity tool?
Is this maybe a joke? Not at all.
“One of the best cybersecurity tools isn’t fancy software or a skilled engineer (both of which are important and have their place). Instead, it is something that doesn’t even cost a cent: news and information.”
Organizations naturally keep their secrets close to their chest when it comes to safety. But some experts say a bit of openness could help on the data-gathering front. MSPs that use publically available news to inform their cybersecurity practices could win big.
Read more here.
security
Google-hosted malvertising
Alphabet’s star player may have dropped the ball on this one. Security researchers discovered that verified advertisers are using Google servers to host malware. Even worse, the malware looks legit enough to trick tech-savvy users. Thanks to Punycode, it’s hard to tell these URLs are scams.
The security experts highlight a security concern where Google-hosted malvertising led users to a deceptive site impersonating the legitimate KeePass password manager. This incident raises alarm among IT professionals, emphasizing the need for heightened awareness of potential security threats within widely used platforms.
Google’s inadvertent involvement in hosting malicious content underscores the evolving challenges in maintaining cybersecurity. IT personnel should remain vigilant, continually update security protocols, and educate users to mitigate the risks associated with deceptive websites and potential malware attacks. Regularly monitoring and adapting security measures is crucial in the dynamic landscape of online threats.
Read more here.
technology
Google completes the switch to mobile-first indexing
Mobile-first no longer plays second fiddle! For the first time, Google’s crawling and indexing algorithms will prioritize mobile versions of sites.
The article we share below reports that Google has fully transitioned to mobile-first indexing, prioritizing mobile versions of websites for search rankings. This development is significant for IT professionals, emphasizing the importance of optimizing websites for mobile devices to maintain and improve search visibility.
IT teams should focus on responsive design, mobile-friendly content, and efficient mobile performance to align with Google’s indexing strategy. Adapting to this shift is crucial for ensuring websites rank well in search results as mobile usage continues to dominate online interactions.
Keeping abreast of search engine updates and implementing mobile-centric strategies will be integral for IT professionals in maintaining an effective web presence and user experience.
Read more here.
ai
Elon Musk to take on ChatGPT with Grok AI
xAI announced its Grok-1 generative AI as a competitor in an increasingly crowded LLM field. But did it jump the gun? Observers were quick to point out that the older GPT-4 outperformed Grok-1 from day one. It’s not exactly vaporware like many Musk projects, but for now, it fits the pattern of being less exciting than promised.
To tell you more, it seems that Elon Musk’s venture, Grok AI, aims to compete with ChatGPT. This development is of interest to IT professionals, signaling potential advancements in AI and natural language processing (NLP).
Musk’s entry into this space suggests a growing focus on innovative AI solutions. IT teams should monitor these developments, as new platforms may offer enhanced capabilities for language-based applications. Assessing the features, performance, and potential applications of Grok AI compared to existing models like ChatGPT will be essential for IT professionals seeking optimal solutions for their projects.
Read more here.
security
Confluence vulnerabilities under active ransomware exploitation
November wasn’t a great month for Atlassian. Not only did we learn that its Confluence servers were weak to a major vulnerability, but researchers say it’s already being exploited in the wild. There’s no word yet on a fix either.
The article highlights active ransomware exploitation targeting vulnerabilities in Confluence, a widely used collaboration platform. This information is crucial for IT professionals and MSPs, emphasizing the urgent need to address and patch vulnerabilities in Confluence installations. Proactive measures, such as applying security patches promptly and monitoring for any signs of compromise, are essential to prevent potential ransomware attacks. IT teams should stay informed about the latest security advisories, prioritize system updates, and reinforce cybersecurity measures to safeguard sensitive data and maintain the integrity of Confluence deployments. Swift and decisive action is key in mitigating the risk posed by active exploitation of vulnerabilities in widely utilized software.
Read more here.
technology
There’s a lot of tech to be thankful for this Thanksgiving
Having narrowly avoided a global recession isn’t the only thing to be happy about this year. To close this newsletter on a positive note, here are some roundups of the tech we take for granted. We’re sure you’ll appreciate how much better life is with these examples of cool hardware and software.
Follow the Domotz IT News Roundup
The future also looks pretty bright, especially if you subscribe to this newsletter. We’ll bring you more insider tech news each month, and it’s free – so go ahead and sign up.
Stay tuned for further updates in the evolving landscape of the IT world.