Billions of smart things
connected, are they really secure?
Smart things such as telephones, televisions, cars,
medical equipment, smart homes, etc… have taken a leading role in today's
market, the aim of these devices is to provide a better product and customer
service.
Approximately 6.4 billion smart things are connected,
only in the United States there are 25 devices connected to the network per 100
inhabitants. People use these devices on a daily basis without realizing that
they can be victims of an information theft attack at any time.
Cyber attacks to the Internet of Things |
Smart phones
Our phones contain important information such as bank account passwords and
credit card information, this information can be stolen simply by downloading
an application that is infected.
Apple iOS Users
It is not recommended to violate the security of the iOS systems, this is
called "jailbreak" and this
practice allows phones to install applications not authorized by Apple App
Store, these types of phones are most vulnerable to attacks.According to the annual report of Symantec given in April 2016
, the Apple phones presented the following attacks:
- 9 new iOS threat families were identified by 2015.
- Bootlegged developer software XcodeGhost, infected up to 4,000 applications.
- YiSpecter malware completely avoided the application store by using the enterprise application provisioning framework.
- Youmi embedded in 256 iOS applications. This software is used in applications to display advertising, but also sends personal information to a remote location without the consent of users.
- Vulnerabilities in Apple's AirDrop wireless file transfer system could allow an attacker to install malware on an Apple device.
Andriod Users
Per the Symantec report, in the first quarter of 2015, 550 attacks were blocked
for the day, gradually decreasing this number until in the fourth quarter again
rose 495 blocked attacks per day.
In July 2015, 7 vulnerabilities were identified and 2 more were identified in October.The attacks mostly come from downloads of multimedia messages like videos.
There were also phishing attacks by opening a fake window to enter the bank password on the banks websites.
In July 2015, 7 vulnerabilities were identified and 2 more were identified in October.The attacks mostly come from downloads of multimedia messages like videos.
There were also phishing attacks by opening a fake window to enter the bank password on the banks websites.
Some of the
recommendations for phone safety are:
• Keep applications up-to-date.
• Don't downloading applications from unauthorized sites.
• Don't Jailbreak the device, they are more vulnerable to attacks.
• If you suspect your account has been compromised, change your Apple ID or Google Play password.
• Be careful of emails or notifications that pop up on your screen asking for personal information.
• Be careful opening unwanted video or audio files.
Smart TVs
These devices can also receive attacks as fraud clicks, be controlled by
criminals without even perceiving it, can steal password data or even be victim
of the ransomware technique that encrypts files and keeps them hostage until a
payment is made. Here is a video demonstration of how smart TVs can be hacked.
Smart cars
A proof-of-concept was made to demonstrate that hackers could have remote control
of the smart cars of the brands Fiat Chrysler and Jeep, but this doesn’t mean
that the other brands are exempt. This goes beyond the theft of information;
this attacks the lives of people. Here is a video that shows how a Jeep is controlled remotely.
In the UK there have been cases of cars theft because keyless smart systems have been hacked.
Smart Homes devices:
Millions of homes can be attacked, Symantec identified 50 devices vulnerable,among them the smart lock that can be opened remotely.
I think smart devices bring a lot of benefits to users,
they do incredible things that we never imagined or just watched in science
fiction movies. It is for this reason that the world is flooded with these
devices, we really like it, they simplify life, they give us intelligent
information when we need it, but definitely the developers of these
technologies require better security mechanisms to prevent information theft or
even attacks against life as in the case of smart cars.
Think about the smart devices you have and evaluate what
actions you could take to avoid an information theft attack?
Comment your ideas so others can also protect themselves.
Hello, Good Article you know your article it's useful me and Thanks for Sharing Information.
ReplyDeleteIndustrial Automation Course in Delhi
Great post, thanks for sharing this article. I am really interested in your blog.
ReplyDeleteGet Verified List of Industrial Automation Companies in Dubai | Best Industrial Automation Companies in UAE | Industrial Automation Companies in Dubai
Thanks for the great details mentioned in the blog.
ReplyDeletePlease Visit: https://www.nirmal.co.in
Thanks for sharing such informative content. High quality boiler system accessories provider offers low cost high and low weight steam boilers. Put in your request online for a high and low weight steam boiler.
ReplyDeleteRental boiler