January 5, 2017 By Larry Loeb 2 min read

During the chaotic opening of the Consumer Electronics Show (CES) in Las Vegas, the Federal Trade Commission (FTC) contributed its own bit of glitz and glamour to the occasion.

The agency announced that on Jan. 4, the first day of CES, it would sponsor a contest to develop an Internet of Things (IoT) patching tool for device hardware to “help protect consumers from security vulnerabilities caused by out-of-date software.” Entrants can also add more advanced features to address — for example, hard-coded, factory default or easy-to-guess passwords in the hardware devices.

“Every day, American consumers are offered innovative new products and services to make their homes smarter,” Jessica Rich, head of the FTC’s Bureau of Consumer Protection, said in a prepared statement. “Consumers want these devices to be secure, so we’re asking for creativity from the public — the tinkerers, thinkers and entrepreneurs — to help them keep device software up to date.”

May the Best IoT Patching Tool Win

The best tool will win $25,000. Three honorable mentions will also win $3,000. The FTC is calling the competition the “IoT Home Inspector Challenge.” Entrants may design a physical device, app or cloud-based service — it won’t matter to the judges, as long as it works.

For the past two years, the FTC has been issuing guidance related to IoT hardware devices. It even formed a special division to deal with them. This competition is another way for the FTC to demonstrate its influence in the space.

Potential Problems

The problem for this competition, however, is that IoT hardware devices cover a wide range of functionality. While some are part of well-defined ecosystems such as home controls, others are standalone devices that offer no obvious path to update the software that runs them. This is the kind of device that the Mirai botnet took advantage of to create a massive distributed denial-of-service (DDoS) attack. The software is hard-coded into the device rather than stored in memory.

In that situation, the tool the FTC seeks would likely be ineffective. Computerworld noted, however, that this kind of device actually led to the genesis of the competition. Such devices may continue to operate long after the company that created them goes out of business.

Entries are due by May 22, and the FTC will accept them as early as March 1. Winners will be announced on July 27, 2017.

More from

White House mandates stricter cybersecurity for R&D institutions

2 min read - Federal cyber regulation is edging further into research and development (R&D) and higher education. A recent memo from the Office of Science and Technology Policy (OSTP) states that certain covered institutions will be required to implement cybersecurity programs for R&D security. These mandates will also apply to institutions of higher education that support R&D. Beyond strengthening the overall U.S. security posture, this move is also in direct response to growing threats posed by the People's Republic of China (PRC), as…

New memo reveals Biden’s cybersecurity priorities through fiscal year 2026

2 min read - On July 10, 2024, the White House released a new memo regarding the Biden administration’s cybersecurity investment priorities, initially proposed in July 2022. This new memorandum now marks the third time the Office of the National Cyber Director (ONCD), headed by Harry Coker, has released updated priorities and outlined procedures regarding the five core pillars of the National Cybersecurity Strategy Implementation Plan (NCSIP), now relevant through fiscal year 2026. Key highlights from the FY26 memorandum In the latest annual version…

How prepared are you for your first Gen AI disruption?

5 min read - Generative artificial intelligence (Gen AI) and its use by businesses to enhance operations and profits are the focus of innovation in virtually every sector and industry. Gartner predicts that global spending on AI software will surge from $124 billion in 2022 to $297 billion by 2027. Businesses are upskilling their teams and hiring costly experts to implement new use cases, new ways to leverage data and new ways to use open-source tooling and resources. What they have failed to look…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today