There can never be too many IoT gadgets -- that Is what people usually think when buying yet another connected device with advanced functionality. From our perspective, we also believe there cannot be too many IoT investigations. So, we have continued our experiments into assessing and uncovering how vulnerable they are, and followed up our study focusing on smart home devices.
Our Latest study has once again confirmed that ‘smart home' doesn't mean ‘secure home'. Several logical vulnerabilities (combined with an unconsciously published serial number) can literally open doors to your house and welcome in cybercriminals. Besides this, remote access and control over your smart heartbeat can cause a wide assortment of sabotage actions, which might cost you through high electricity bills, a flood or, even more importantly, your psychological health.
But even in case a smart hub is protected, never forget that the devil is in the details: a very small thing like a light bulb could function as entry-point for hackers as well, providing them with access to a local network.
Always change the default password. Instead use a strict and complicated one. Be aware and always check the latest information on found IoT vulnerabilities.
No Less important is that sellers should improve and increase their security approach to ensure their devices are adequately protected and, as a result, their users. Along with a cyber-security check, which can be just as vital as testing other features before releasing a product, it's necessary to follow IoT cyber security standards. Kaspersky Lab has recently contributed into the ITU-T (International Telecommunication Union -- Telecommunication sector) Recommendation, created to help maintain the proper protection of IoT systems, such as smart cities, wearable and standalone medical devices and lots of others.
Our Latest study has once again confirmed that ‘smart house' doesn't mean ‘secure home'. Several logical vulnerabilities (combined with an unconsciously published serial number) can literally open doors to your house and welcome in cybercriminals. Other than this, remote access and control over your smart hub can cause a wide assortment of sabotage actions, which might cost you via high electricity bills, a flood or, even more importantly, your psychological health.
But Even if your smart hub is secure, remember that the devil is in the details: a tiny thing such as a light bulb could function as entry-point for hackers as well, providing them with access to a local community.
That's why it is highly important for users to follow these simple cyber hygiene principles:
Always instead use a strict and complicated one. Do not forget to update it regularly. Be aware and always check the latest information on discovered IoT vulnerabilities.
No Less important is that vendors should improve and increase their security approach to make sure their devices are adequately protected and, because of this, their users. In addition to some cyber security check, which is just as vital as analyzing other features before releasing a product, it is necessary to follow IoT cyber security standards. These programs were created to help maintain the proper security of IoT systems, such as smart cities, wearable and standalone medical devices and lots of others.
By way of instance, fake temperature data ‘generated' by an environmental monitoring device can be spoofed and forwarded to the cloud. Similarly, an attacker can disable vulnerable HVAC systems through a heat wave, making a disastrous scenario for service providers with affected models. Data created by unprotected wearables and smart appliances offer cyber attackers with an ample amount of targeted personal information that could potentially be exploited for fraudulent transactions and identify theft. The attacker hijacks and effectively assumes control of a device. These attacks are quite difficult to detect because the attacker doesn't alter the basic functionality of the device. Moreover, it only takes one device to potentially re-infect all smart devices in the home. By way of instance, an attacker who originally compromises a thermostat can theoretically gain access to an entire network and remotely unlock a door or change the keypad PIN code to limit entry. A denial-of-service assault (dDoS attack) attempts to leave a machine or network source unavailable to its intended users by temporarily or indefinitely disrupting services of a host on the Internet. In the event of a dispersed denial-of-service attack (DDoS), incoming visitors flooding a target arises from multiple sources, making it difficult to stop the cyber offensive simply by blocking a single origin. This isn't surprising, especially as a single compromised smart sensor on a system can infect similar devices running the same software. These infected devices are then forced to combine vast botnet armies that perform crippling DDoS attacks. Permanent denial-of-service strikes (PDoS), also referred to as phlashing, and is an attack that damages the device so badly that it requires replacement or reinstallation of hardware. Another example could see fake data fed to thermostats in an effort to cause irreparable harm via extreme overheating.
Best short answer in controlling these Issues is using a protocol that decentralizes the data to begin with such as Dxchain.
Thus, the few steps involved in creating and sending the Right requests to the server can provide remote attackers with the possibility Of downloading data to get the user's web interface account, which doesn't Lights or water, or, even worse, open the doors. So, one day, someone's smart Life could be turned into a total nightmare. We reported all the information concerning the discovered vulnerabilities to the vendor, which are now being fixed.
Referral Link - https://t.me/DxChainBot?start=uiq311-uiq311
DxChain's website - https://www.dxchain.com
✅ @chrisgab, I gave you an upvote on your post! Please give me a follow and I will give you a follow in return and possible future votes!
Thank you in advance!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Congratulations @chrisgab! You received a personal award!
You can view your badges on your Steem Board and compare to others on the Steem Ranking
Vote for @Steemitboard as a witness to get one more award and increased upvotes!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit