KW 27: Physical access control systems most vulnerable to attacks, Linux’ Ubuntu 20.04, Deutsche Telekom IoT Ltd


Physical access control systems most vulnerable to attacks: Possible attack scenarios and security risks are constantly increasing due to the linking of devices, gadgets and machines in the Internet of Things. Smart buildings, medical devices, network devices and VoIP telephones in particular fall into a risk group, according to a study by the American device visibility and control specialist Forescout.

Linux’ Ubuntu 20.04: The Linux Mint developers have delivered updates in the new version 20. The data transfer between different computers will be more easily facilitated, among other things, with a new “Warpinator” tool. It is one of the highlights of Linux Mint 20.

Deutsche Telekom IoT Ltd: Deutsche Telekom is entering the IoT market. The plan is to make Telekom’s new “IoT hub” the central point of contact for the Internet of Things. Customers, developers, operators, partners or suppliers from the IoT environment will come together in a platform economy with Telekom’s own subsidiary. In addition to cloud services and solutions for data analysis, the IoT hub will also provide device connectivity.

Security deficiencies in home routers: Fraunhofer FKIE has warned of defects in home routers. After 127 home routers from seven manufacturers were examined for possible weak points, it was found that many routers were not adequately supplied with security updates or that they still have easy-to-guess or even hard-coded passwords. The results were terrifying: not a single router was without errors.

iPhone 12: Without charger and headphones?
Trend: App development
Windows: Window 10 update
IoT: App for photovoltaic craftsmen


Almost 30 percent of managed Windows devices in the financial services industry are not patched against the BlueKeep vulnerability.


Where the use of AI has added value: The use of artificial intelligence can advance businesses. But automation is not the same as AI. Because real AI systems automatically recognize what needs to be done, while automation technologies based on machine intelligence can be problematic. Rule-based systems can help with algorithms in various use cases, and they can still deal with known data patterns. However, in the case of unknown patterns, the use of deep learning or artificial general intelligence is recommended.

Cloud computing is growing: Bitkom Research and KPMG stated in the Cloud Monitor 2020 that many companies are using new digital technologies via the public cloud for IoT or data lake application solutions. Three out of four companies use cloud computing. As a result, the company’s own data center is losing importance. Cloud applications have prevailed across the economy as the key technology for tomorrow’s business, said Dr. Axel Pols, managing director of Bitkom Research.


“Alternatively, the state could implement a comprehensive surveillance system by accessing citizens’ stored passport photos. The possibility of being anonymous in public would be a thing of the past.”
AI researcher Florian Gallwitz has criticized the use of AI by the federal police in Berlin Südkreuz and warned of negative consequences.

Newsletter subscription

Subscribe to our free weekly newsletter for a compact overview of the Internet of Things:


More digital news briefings

Our political briefings