Android Century
  • Home
  • Android Zone
    • Android Apps
    • Android Games
    • Apps APk Files
    • Games Apk Files
    • Apps Hack Tricks
  • Reviews
  • Fantasy Zone
    • Entertainment
    • Quotes and Status
    • Life Style
    • Home Made Tips
    • Hair Care
    • Skin Care
    • Fantasy Tips
  • Tricks
    • Free Recharge
    • Free Internet
    • shopping Cashback
    • Recharge Cashback
  • Tech
  • Mobiles
  • Gadgets
  • News
  • How To's
  • Software
Breaking
Loading...

Featured post

How to Take Great Photos With Apple's iPhone X

Recent Posts

Labels

  • Android Apk Files
  • Android Apps
  • Android Games
  • Apps Apk Files
  • Entertainment
  • Fantasy Tips
  • Gadgets
  • Hair Care
  • HomeMade Tips
  • How To's
  • News
  • Quotes
  • Quotes & Status
  • Recharge Cashback
  • Recharge Promo Codes
  • Shopping Cashback
  • Technology
  • skin care
Home / News / The internet of things can be hacked – and the risks are growing every day

The internet of things can be hacked – and the risks are growing every day

Latest Govt. Jobs 22:04:00 News Edit
We’re rapidly entering a new phase of technological evolution, in which pretty much everything around us is connected to the internet. The term used to describe this increasingly connected ecosystem is the internet of things (IoT), and it’s attracting the biggest names in tech, from Apple to Samsung and everyone in between.
If the tech pundits are right, everything from toasters to light bulbs will soon have internet functionalities.
While connected technology provides a plethora of new and exciting possibilities, it also brings challenges – and the biggest challenges of all involve security. Any internet-enabled device is potentially vulnerable to attack from hackers – so imagine the risks when virtually every object and appliance we use is connected.
Much of the tech-using public remains unaware of such threats, despite repeated warnings from governments and industry bodies; according to Canonical, the company behind operating system Ubuntu, around half the British population is unaware that connected devices can be hacked.
Yet the dangers are all-too real. From taking control of connected cars to using everyday appliances such as fridges as to launch catastrophic cyber attacks, hackers are taking advantage of the IoT big time.

Compromised cars

One industry that’s been quick to seize on the potential offered by the internet of things is motor manufacturing. Car makers are increasingly launching models that sport internet-enabled infotainment systems and hubs, and driverless cars aren't far behind. But while the connected car industry is booming, the road ahead is far from smooth.
Last year the FBI teamed up with the US Department of Transportation and the National Highway Traffic and Safety Administration to warn people about cyber security threats to cars. This followed a controlled experiment by two hackers, whowere able compromise a Jeep Cherokee while it was travelling at 70mph by turning the steering wheel and applying the brakes remotely. 
If this were to happen in the real world, lives could be put at risk. Adam Boulton, senior vice president of security technology at BlackBerry, says that both manufacturers of autonomous and connected vehicles, and consumers, need to be aware of the security implications. Boulton envisages an era in which cars are held to ransom by hackers, and sabotaged or used in cyber attacks.
“We are already seeing connected cars on the market that incorporate automated features such as adaptive cruise control, automatic parking, and traffic jam assist,” Boulton says. “This needs to herald an era of reduced accidents, lower pollution, eased congestion and greater productivity.”
“However, without adequate security technology underpinning these vehicles, they could herald an era of engines being shut down remotely, cars being held to ransom by hackers or even being used to support DDoS attacks on major websites. 
“Preventing malicious actors from taking control of vehicles requires a delicate balance in engineering, not only ensuring the vehicle is secure but also remains safe. Connected vehicles require advanced technologies like secure boot to ensure the integrity of the vehicle is intact.”

Meddling hackers

As well as hacking into computer systems to cause chaos, cyber criminals are increasingly attempting to exploit connected gadgets such as Wi-Fi routers, webcams, smart thermostats and wearables to launch wide-scale attacks on companies and organizations.
Mirai is a popular form of malware among hackers, offering the ability to turn systems into botnets to initiate network compromises. In September 2016, hackers used 152,000 consumer IoT devices to initiate a distributed denial of service (DDoS) attack on French hosting provider OVH . They were able to inundate the company with 1Tbps of traffic, causing mayhem for customers around the world.
Consumers and their devices have essentially become unwitting accomplices in cyber attacks, and there’s nothing stopping this from happening again. Paul McEvatt, senior cyber threat intelligence manager for the UK & Ireland at tech giant Fujitsu, predicts that we’ll see more such incidents happen in the next few years.
“As we continue to see the exponential growth of internet of things devices, we will continue to see security issues we hadn’t even considered before,” he says.
“When an architect pulled together the design of smart motorway noticeboards, they wouldn’t have considered that hacktivists would target them to display politically motivated messages. The same is true of IoT manufacturers who built the hundreds of thousands of CCTV cameras, DVRs and SOHO routers that now make up the IoT ‘Mirai’ botnet.
“Lessons will clearly be learned from Mirai, such as avoiding hard coding default passwords but many of the protocols designed for smart connected devices will have their own potential flaws and vulnerabilities.
“Attackers have exploited these vulnerabilities to their advantage already, so while ransomware having the ability to take out a city of ‘smart’ connected lights would have seemed unlikely and unfeasible 12 months ago, recent events have changed that perception.”
McEvatt blames manufacturers for these issues. “The issue is that manufacturers are failing to implement robust security controls from the outset, whether that’s for routers, smart devices or connected cars,” he adds.

No device is safe

The internet of things industry is expanding exponentially, with consumers flocking to the shops to get their hands on the latest connected tech. Cyber criminals see this as a lucrative opportunity, as in most cases consumer-ready hardware can be relatively easy to hack.
According to recent research , hundreds of millions of internet-connected devices are vulnerable to attacks from cybercriminals. Nick Shaw, vice president and general manager for antivirus software maker Norton, says common devices such as smart TVs, home security systems and baby cameras are all hackable, and can be exploited as botnets, or for ransomware and fraud.
“As we continue to adopt more internet-connected devices in our daily lives cyber criminals are starting to pay attention,” he says. “We’re seeing consumer devices being hijacked because they are connected to the internet and their default device passwords have not been changed.
“From laptops and mobile phones, to fitness trackers and routers to home security systems, smart TVs and baby monitors, any internet-connected device is a potential target but the ones with default passwords, infrequent updates and poor security protocols are the most vulnerable.”
“Often consumers don’t register that their connected wearables or home devices are exposed to the same risks as their laptop or mobile phone. As such they don’t take the steps to secure them properly.”
Shaw adds that consumers can reduce the risk of their devices being hacked by change the default device credentials, disabling unused services, modifying the privacy settings of the device and ensuring firmware is up to date.
The internet of things is still in a state of relative infancy, and as it continues to expand and evolve it’s likely that the security threats it brings with it will become more complex and widespread.
There’s now an urgent need for manufacturers and other organizations to develop safeguards to stop hackers in their tracks – and we can all play our part by exercising a little common sense to reduce the chances that we, and our IoT devices, will be the next victims.
Share on Facebook Share on Twitter Share on Google Plus

RELATED POSTS


Xiaomi Redmi 5 with 18:9 display

Vivo V9 with dual rear cameras

Xiaomi Redmi 5 launch
The internet of things can be hacked – and the risks are growing every day The internet of things can be hacked – and the risks are growing every day Reviewed by Latest Govt. Jobs on 22:04:00 Rating: 5

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments ( Atom )

Search This Blog

TEST BOOK FOR GOVT ENTRANCE TEST

TEST BOOK FOR GOVT ENTRANCE TEST
Find All Latest book for preparation of SSC,RAILWAYBANK PO,RBI,BANK CLERK,GATE ME,GATE CE are available here in less prices, to check out the books click here

Translate

  • Popular Post
  • Random posts
  • Category

Popular Posts

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & Earn Offer:  Hey Guys! Today I make an article about Teen Patti Referral ...
  • (no title)
    SUMMARY To many a tablet is an ...
  • How to Remove Malware and Adware From Your Mac
    Yes, Macs can get malware. Beyond traditional viruses, worms, and Trojans,  there’s now a ...
  • Infocus Vision 3 review
    What happens when you hear about a smartphone that is priced below Rs 7,000 but comes with two ...
  • Tinyowl Freecharge Offer – Get 15% Cashback + extra 25% cashback using Freecharge [Ultimatez Tricks]
    Tinyowl Freecharge Offer – Freecharge is now offering 25% cashback on Tinyowl food orders paid via ...
  • The N64 controller is the most important of all time
    Whenever you pick up a joypad these days, one thing is common – the presence of analog ...

Random Posts

  • Scientists develop DeepStack, an AI that can beat expert Poker players
    Scientists develop DeepStack, an AI that can beat expert Poker players
    06.03.2017 - 0 Comments
    A team of scientists has developed an artificial intelligence system…
  • Reliance JioPhone
    Reliance JioPhone
    19.08.2017 - 0 Comments
    Interest in the Reliance JioPhone is apparently high.  A number of Reliance Digital and Express Mini…
  • Google tweaks its Verify Apps security feature to show what's been scanned
    Google tweaks its Verify Apps security feature to show what's been scanned
    17.02.2017 - 0 Comments
    Google has long used its Verify Apps feature to target possible malware before it can affect our phones,…
  • Xiaomi Mi LED Smart TV 4 Review
    Xiaomi Mi LED Smart TV 4 Review
    09.03.2018 - 0 Comments
    As a brand in India, Xiaomi is still relatively new and yet has made a name for itself. So much so that…
  • How to enhance Your blog Search Engine rankings in 7 way
    How to enhance Your blog Search Engine rankings in 7 way
    01.04.2017 - 0 Comments
    “How to improve your keywords ranking in Google?” is probably the million dollar question every blogger has…

Labels

Android Apk Files Android Apps Android Games Apps Apk Files Apps Hack Tricks Entertainment Free Internet Freecharge Gadgets Games Apk Files How To's Laptops Guide Mobiles Reviews Technology Viral's android zone free recharge

Entertainment

Tricks

Popular Posts

  • Free Adidas shoes scam on WhatsApp Beware of this
    LONDON: If you ...
  • Moto G5 Plus review
    VERDICT ...
  • Xiaomi starts rolling out MIUI 8.2 for these handsets
    Xiaomi  has ...
  • New ADATA XPG SX8000 M.2 NVMe SSD review
    M.2 NVMe SSDs ...
  • New taxi booking app 'Baxi' to provide avenue-facet pickup in seven Indian towns
    People in  ...
  • We constant vulnerabilities years back: Apple on Wikileaks CIA files
    A day after  ...
  • GroPro Hero 6 Black Review
    While GoPro ...

Random Posts

  • It's not too late for Apple TV 2017
    It's not too late for Apple TV 2017
    22.02.2017 - 0 Comments
    Time hasn’t been kind to the fourth-generation Apple TV. In recent months, Apple’s streaming…
  • Samsung Gear Fit 2 review
    Samsung Gear Fit 2 review
    05.04.2017 - 0 Comments
    Samsung VERDICT With the Gear Fit 2 Samsung has made hefty changes to its wearable line both inside and…
  • Here’s what next for VR Affordability and trade-offs, says Intel
    Here’s what next for VR Affordability and trade-offs, says Intel
    04.03.2017 - 0 Comments
    When it comes to VR, you might say that Intel maintains a behind-the-scenes approach…
  • Top best headphones of 2017
    Top best headphones of 2017
    10.03.2017 - 0 Comments
    Every phone under the sun these days comes bundled with a pair of cheap in-ear headphones, but…
  • Neargroup app pivots to online speed dating service
    Neargroup app pivots to online speed dating service
    15.02.2017 - 0 Comments
    Neargroup, a bot-based neighbourhood connect service that works on FB Messenger has changed its focus…

Most Popular

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & ...
  • SAMSUNG GALAXY J7 (2016) REVIEWS
    SAMSUNG GALAXY J7 (2016) REVIEWS
    SAMSUNG GALAXY J ...
  • Top 5 Best SmartPhones under 7000 Rs (March 2017)
    Looking for the ...
  • Apple, IBM, Cisco are huge because of Indians, do not deny them H-1B visa: RBI Governor Urjit Patel
    ...
  • SAMSUNG GALAXY J7 (2016) Specifications
    SAMSUNG GALAXY J ...
  • BlackBerry Teases Marshmallow Beta Testing for Priv by Next Week
    Blackberry ...
  • LG Q6 Review
    LG Q6 Review
    2017 is ...

Contact Form

Name

Email *

Message *

Offers Zone

Created By Android Century Distributed by Android Century
  • Home
  • About us
  • Contact us
  • Privacy policy
  • Terms of use
  • Advertise here
Subscribe Via Email Subscribe To Android Century By Email And Get Free Updates. ;-)


Your email address is safe with us!