Subscribe to our Newsletter | To Post On IoT Central, Click here


mobile apps (3)

The topic of the evolution of technology over the years is a vast one, and any discussion in this matter is bound to be extensive. For this article, we will narrow down our focus to three products of this rapid evolution: the Internet of Things, cloud computing, and mobile app development. To be more precise, we will discuss the impact of cloud computing and IoT on mobile apps and how they have transformed the latter ever since they first burst onto the scene.


Everyone knows that mobile apps are a crucial part of the digital world that we live in, and their development is bound to be affected by factors in the ecosystem. In this context, there are currently two 'factors' that have been in the limelight -- IoT and cloud computing. Among other things, these two phenomena have had a significant impact on the development process and completely transforming how programmers and companies behind mobile apps go about it.


So, let's jump into it and take a closer look at how the Internet of Things and cloud computing have changed the face of mobile app development.

1. Mobile Enterprise Application Platforms: A mobile enterprise application platform, or simply MEAP, is an IoT tool that is meant to ease support for mobile apps and enable developers to make use of cloud computing. Put, it is essentially an extensive collection of multiple resources and services aimed at helping developers quickly build hybrid cross-device mobile apps. MEAPs also ensure that data stored in the cloud is delivered to different devices without a hitch.


2. Enhanced security: Cloud platforms today come fortified with high levels of encryption along with other modern security measures to make sure that data stored in it as secure as it can be. So, what is the cardinal rule when it comes to mobile apps? Ensure thorough and absolute security! So, with the cloud, companies can administer centralized security. Also, let's not forget that the integration of advanced security measures means that any data transfer is utterly safe and secure, thus further fortifying the cloud's position as a leading and trusted resource for mobile apps. Oh, and did we mention the bonus of security? Thanks to more secure mobile apps, business users are more open to adopting enterprise apps.


3. Cross-platform apps: Considering the growth in popularity of cross-platform apps, it isn't surprising to see that the cloud has had a role to play in this context as well. Such apps are necessarily web apps wrapped in a native container, which, interestingly relies on the cloud for data transmission so they can operate on most platforms available in the market.


There is no doubt that mobile app development is nothing like what it used to, say, a decade ago. However, to ensure the success of the mobile apps you build, it is imperative that you continually stayed clued into the latest trends in the market. It will allow you to deliver A1 apps to the demanding customers of today.

Read more…

With the Internet of Things (IoT) connecting more and more devices with each passing day, it is expected that by the year 2020, the number of IoT devices will reach around 24 billion out there in the world.

Now, this growth is certainly going to benefit the people in more than many ways and will hugely transform how people execute day-to-day tasks & a lot of other activities. As we live in the times when “impressions” are crucial for a person’s status, hence it will be cool to have a smart-home that will draw the attention of your visitors & guests and certainly make you the talk of the town. Meanwhile, among its significant benefits, one is the smart lighting that will actually be able to largely reduce the energy consumption, thus resulting in lowering down the electricity bill.

With this new technology, linking up connected cars with smart city infrastructure is possible, thus establishing a totally different ecosystem for the car drivers, who until now are accustomed to the conventional way of covering the distance from Area A to Area B. Also, there are connected healthcare devices at the disposal giving people a fuller and deeper look at their own health.  So, what more can we ask for?

But these tons of benefits certainly invite some sort of risks and security issues and this is what we will be discussing here today.

Do you know that increased numbers of connected devices are giving cybercriminals and hackers more entry points? And why just security issues, as average customers, are genuinely sharing their concerns over their privacy, with so much of consumer life being connected.

IoT – What makes it vulnerable to security aspect?

IoT is a growth sector, and besides that, it is also a market for buyers and investors, and where consumers are willing to grab the best-possible benefit at a little amount. Quite certainly, this kind of environment encourages vendors & manufactures to economize on money, effort, time and material, hence they enroll into the cheapest ways, hastening to put their services and products out there into the money stream.

This sends a direct invitation to practices, like usage of software code and generic components, access codes, default passwords, vendor-specific PIN numbers. All of this opens a path for an ecosystem that has weak security and exploitable vulnerabilities.

A study carried on by Ponemon Institute and IBM security suggest that around 80% enterprises usually do not test their IoT apps, hence making them vulnerable from a security perspective.

Here we have categorized various areas of IoT security vulnerability that are the most common:

Vulnerable to Hacking: According to the researchers, hackers were successful in hacking these real IoT devices with enough energy and time, within a limited time. Like, a research team at Michigan University and Microsoft discovered a lot of gaps in the security of Samsung’s Smart Things smart-home platform. Unfortunately, the methods didn’t appear complex at all.

Poor On-board Web Interface: There is an onboard web server for most of the IoT devices and it does the job of hosting a web app used in device management. Now, in case, any loopholes found in the underlying code of the web apps and web servers, then that certainly makes the device vulnerable to get attacked – maybe in a remote manner owing to its connectivity to the internet.

Weak mobile security: Weak security on mobile app development often makes the IoT devices vulnerable from a security point of view. The biggest problem lies in the fact that data is being stored on mobile applications. Even though the data that is saved on iOS is less risky as compared to Android app development, still to storage of sensitive data and information on a mobile device is never considered ideal. Like, what if a worker ends up losing a smartphone which contained valuable data in it, that too with no backup.

Vulnerable Cloud & Mobile Management Platforms:  As there are a huge number of IoT devices that connect to wireless and cloud mobile networks, hence the poor security and exploitable code in the software & infrastructure, which manages these platforms, has also become a major concern. To address these issues there are management platforms embedded on these devices, but that works only to a certain extent, with there being a risk, these interfaces are not being patched or updated on a regular note. 

Concerns regarding Privacy & Data Transfer: Since IoT device comes with a constant flow of information regarding the device and its environment, it is not obvious that it will be delivered to the users. Like, depending on the device and its application, there could be financial, geographic and personal information. In case, there is poor or say no encryption at all on these data streams, then this kind of information becomes vulnerable to be used by third parties, hackers, or maybe eavesdroppers.

Often the companies are not prepared: As per AT&T’s Cybersecurity Insights Report, around 5,000 companies were surveyed across the world and it was found that 85% of them are about to or are planning on a deployment of IoT devices. Still, there are just 10% of companies, which as per the survey, are confident about security infrastructure attuned to devices against hackers.

Weak Authentication protocols: Often it happens that in the manner devices speak to their controllers and each other links them to an open channel. The reason could be the mechanisms used for authorization or authentications of legitimate communications. Perhaps insecure default device settings are deployed automatically, about which users are unaware, or maybe not given the opportunity to reconfigure weak security settings for themselves.

To stay realistic about IoT security risks is the key to combat this problem

Today more and more security researchers are focusing on the IoT, with few of their researchers posing kind of a theoretical risk instead of an actual one – at least for now. Like, one researcher came across this concept where smart lighting was used to filtrate data by compromising an internal network. Now is it possible getting a light in a room fluctuate enough such that it is able to transmit data? It is very doable in the test environment, whereas in the real world it is yet to be proven.

Even though more and more security researchers today are focusing on uncovering a range of IoT security concerns, but Deral Heiland, a veteran penetration tester, stresses the significance of having a realistic perspective. Sharing his experience, he said people keep asking him what to do with all these vulnerabilities that are coming out. His answer to them is quite logical. He states these vulnerabilities are being uncovered and the researchers and testers are making efforts to find a solution in order to combat such situations.  This says it all, doesn’t it?

Read more…

IoT Open Discussion Forums

Upcoming IoT Events

More IoT News

How wearables can improve healthcare | TECH(talk)

Wearable tech can help users track their fitness goals, but these devices can also give wearers ownership of their electronic health records. TECH(talk)'s Juliet Beauchamp and Computerworld's Lucas Mearian take a look at how wearable health tech can… Continue

IoT Career Opportunities