There can never be too many IoT gadgets -- that Is what people usually think when purchasing yet another connected device with advanced performance. From our standpoint, we also believe there can't be too many IoT investigations. So, we have continued our experiments into checking and uncovering how vulnerable they are, and followed our study focusing on smart home devices.
Our Latest research has once again confirmed that ‘smart home' doesn't mean ‘secure home'. Several logical vulnerabilities (combined with an unconsciously published serial number) can literally open doors to your house and welcome in cybercriminals. Other than this, remote access and control over your smart hub can lead to a wide assortment of sabotage activities, which could cost you through high electricity bills, a flood or, even more importantly, your psychological health.
But Even if your smart hub is protected, never forget that the devil is in the details: a tiny thing like a light bulb could function as entry-point for hackers also, providing them with access to a local community.
Always rather use a strict and complex one. Do not forget to update it regularly .Don't share serial numbers, IP addresses and other sensitive information regarding your smart devices on social networks.
No Less important is that sellers should improve and increase their security approach to ensure their devices are adequately protected and, as a result, their users. In addition to a cyber-security check, which can be just as vital as analyzing different features before releasing a product, it is crucial to follow IoT cyber security standards.
Our Latest research has once again confirmed that ‘smart home' doesn't mean ‘secure home'. Several logical vulnerabilities (combined with an unconsciously published serial number) can literally open doors to your house and welcome in cybercriminals. Other than this, remote access and control over your smart hub may cause a wide range of sabotage actions, which could cost you through high electricity bills, a flood or, even more importantly, your psychological health.
But even in case a smart hub is secure, remember that the devil is in the details: a tiny thing such as a light bulb could serve as an entry-point for hackers as well, providing them with access to a local community.
That's why it's highly important for users to follow these simple cyber hygiene principles:
Always change the default password. Rather use a strict and complicated one. Don't forget to update it regularly. Do not share serial numbers, IP addresses and other sensitive information regarding your smart devices on social networks. Be aware and always check the latest information on found IoT vulnerabilities.
No Less important is that sellers should improve and enhance their security approach to ensure their devices are adequately protected and, as a result, their users. Along with a cyber-security check, which is just as vital as testing other features before releasing a product, it's necessary to follow IoT cyber security standards. These systems were created to help maintain the proper security of IoT systems, including smart cities, wearable and standalone medical devices and lots of others.
By way of example, fake temperature data ‘generated' by an environmental monitoring device can be spoofed and forwarded to the cloud. Similarly, an attacker can disable vulnerable HVAC systems through a heat wave, creating a disastrous scenario for service providers with affected models. Data generated by unprotected wearables and smart appliances provide cyber attackers with an ample amount of targeted private information that could potentially be exploited for fraudulent transactions and identify theft. The attacker hijacks and effectively assumes control of a device. These attacks are quite difficult to detect because the attacker doesn't alter the basic functionality of the device. What's more, it only takes one device to possibly re-infect all smart devices in the home. For example, an attacker who originally compromises a thermostat can theoretically obtain access to an entire system and remotely unlock a door or adjust the keypad PIN code to limit entry. A denial-of-service assault (dDoS attack) attempts to leave a machine or network source unavailable to the intended users by indefinitely or temporarily disrupting services of a host connected to the Internet. In the case of a dispersed denial-of-service attack (DDoS), incoming visitors flooding a target arises from multiple sources, which makes it difficult to stop the cyber offensive simply by blocking a single source. This is not surprising, especially as one compromised smart sensor on a network can infect similar devices running the same software. These infected devices are then forced to combine vast botnet armies that perform crippling DDoS attacks. Permanent denial-of-service strikes (PDoS), also known as phlashing, are an attack that damages the apparatus so badly that it requires replacement or reinstallation of hardware. Another example could see fake data fed to thermostats in an attempt to cause irreparable damage via extreme overheating.
Best short answer in controlling these Issues is having a protocol which decentralizes the data to begin with such as Dxchain.
Thus, the few steps involved with generating and sending the Right requests to the server can offer remote attackers with the possibility Of downloading data to get the user's web interface accounts, which doesn't Have any extra security layers, such as 2FA (Two Factor Authentication). Lights or water, or, even worse, open the doors. So, one day, someone's smart Life could be turned into a complete nightmare. We reported all the information about the discovered vulnerabilities to the seller, which are now being fixed.
Referral Link - https://t.me/DxChainBot?start=20hxz3-20hxz3
https://www.dxchain.com/
✅ @moneromonster, I gave you an upvote on your post! Please give me a follow and I will give you a follow in return and possible future votes!
Thank you in advance!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Congratulations @moneromonster! You received a personal award!
You can view your badges on your Steem Board and compare to others on the Steem Ranking
Vote for @Steemitboard as a witness to get one more award and increased upvotes!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit