Menu
How the Internet of Things opens your home to cyber threats

How the Internet of Things opens your home to cyber threats

IoT gives professional hackers and malware developers access to intellectual property

Frankenmeat may not be the only spam in your refrigerator. A month or so ago, a smart refrigerator was identified as a source of malicious emails. That's just one example of the future we face as we connect millions of insecure devices to the Internet.

Eric Vyncke, a distinguished engineer with Cisco, described the risks and proposed some solutions in a presentation at the RSA Security Conference in San Francisco last week.

The Internet of Things (IoT) is a blanket term used to describe our increasingly connected world. Refrigerators, thermostats, cars, smoke detectors, watches, glasses, and just about every other appliance you can think of is being connected to the Internet to provide remote access or to monitor and collected data. IoT has tremendous potential to enhance our standard of living, but it also introduces substantial risk for devices that were previously immune from such threats.

Vyncke explained that worms, trojans, and botnets that were once limited to PCs and mobile devices can now infect a television or home security system. A new generation of "script kiddie" has been born--hackers without a specific goal or malicious intent who access things just because they can. These opportunists watch you on your insecure webcam or home security monitoring system, steal content, adjust your thermostat, or even turn off your lights. Even things that don't have an IP address of their own -like a Nike FuelBand fitness device, for example - still pose some risk because they collect potentially sensitive information about you and sync that information to the Internet where it could be hacked and compromised.

As annoying as that may be, the real concern is organized crime and cyber terrorism. IoT gives professional hackers and malware developers access to intellectual property and an ability to spy on or sabotage manufacturing facilities and critical infrastructure systems like the power grid, oil pipelines, nuclear power plants, and railway systems. On a more personal level, a criminal who can hack your smart metering utility system can identify when usage drops and assume that means nobody is home.

Vyncke suggested that the Internet of Things is far too broad for security analysis to be performed against all use cases and risk scenarios. He told the audience that developers need to focus on generic properties of that are common across its different technologies. If we cut the problem into smaller, more manageable pieces, we can at least begin to take steps in the right direction.


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags securityhackershackingInternet of Things

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments