Android Century
  • Home
  • Android Zone
    • Android Apps
    • Android Games
    • Apps APk Files
    • Games Apk Files
    • Apps Hack Tricks
  • Reviews
  • Fantasy Zone
    • Entertainment
    • Quotes and Status
    • Life Style
    • Home Made Tips
    • Hair Care
    • Skin Care
    • Fantasy Tips
  • Tricks
    • Free Recharge
    • Free Internet
    • shopping Cashback
    • Recharge Cashback
  • Tech
  • Mobiles
  • Gadgets
  • News
  • How To's
  • Software
Breaking
Loading...

Featured post

How to Take Great Photos With Apple's iPhone X

Recent Posts

Labels

  • Android Apk Files
  • Android Apps
  • Android Games
  • Apps Apk Files
  • Entertainment
  • Fantasy Tips
  • Gadgets
  • Hair Care
  • HomeMade Tips
  • How To's
  • News
  • Quotes
  • Quotes & Status
  • Recharge Cashback
  • Recharge Promo Codes
  • Shopping Cashback
  • Technology
  • skin care
Home / News / Now Robots are just as plagued by security vulnerabilities as IoT devices

Now Robots are just as plagued by security vulnerabilities as IoT devices

Latest Govt. Jobs 22:59:00 News Edit
Robots are riddled with basic flaws that expose them to hackers.

An analysis of robots used in homes, businesses and industrial installations has revealed many of the same basic weaknesses that are common in IoT devices, raising questions about security implications for human safety.
The robotics industry has already seen significant growth in recent years and will only further accelerate. Robots are  expected to serve in many roles, from assisting people in homes, stores and medical facilities, to manufacturing things in factories and even handling security and law enforcement tasks.
"When you think of robots as computers with arms, legs, or wheels, they become kinetic IoT devices that, if hacked, can pose new serious threats we have never encountered before," researchers from cybersecurity consultancy firm IOActive said in a new report.
"As human-robot interactions improve and evolve, new attack vectors emerge and threat scenarios expand," the researchers said. "Mechanical extremities, peripheral devices, and human trust expand the area where cybersecurity issues could be exploited to cause harm, destroy property, or even kill."
The research, performed by IOActive CTO Cesar Cerrudo and Senior Security Consultant Lucas Apa, involved analyzing the mobile applications, operating systems, firmware images and other software used in home, business and industrial robots from multiple vendors.
The robots for which software components were tested included: the NAO and Pepper robots from SoftBank Robotics, the Alpha 1S and Alpha 2 robots from UBTECH Robotics, the ROBOTIS OP2 and THORMANG3 robots from ROBOTIS, the UR3, UR5 and UR10 robots from Universal Robots, the Baxter and Sawyer robots from Rethink Robotics and several robots using the V-Sido robot control technology from a company called Asratec.
The researchers found that most robots used insecure communications, had authentication issues, were missing authorization schemes, used weak cryptography, exposed private information, came with weak configurations by default and were built using vulnerable open source frameworks and libraries.
While not all of the robots had all of these problems, each robot had several of them, the researchers said in their report. This led them to conclude that other robots that were not included in the assessment likely have many of the same issues.
Some robots can be controlled from mobile apps or can be programmed with software installed on computers. Other robots communicate with cloud-based services to receive software updates and applications.
If the communication channels between these various components are not secure and encrypted, attackers can potentially launch man-in-the-middle attacks and inject malicious commands or software updates to be executed on the robots.
Furthermore, many of the tested robot firmware and operating systems had remotely accessible services that provided access to different functions. Accessing some of these services did not require any authentication. Some services required authentication, but used weak mechanisms that could be easily bypassed.
"This is one of the most critical problems we found, allowing anyone to remotely and easily hack the robots," the researchers said in their report.
Some robots did not encrypt stored passwords, cryptographic keys, credentials for third party services and other sensitive data. Others attempted to protect data with encryption, but with encryption schemes that were improperly implemented.
Many of the accompanying mobile apps were found to send sensitive information like network, device and GPS details to remote services without user consent and some robots' default configurations included insecure features that could not be easily disabled or default passwords that could not be changed.
Some of the authentication, authorization and insecure communication issues were the result of vulnerabilities in open-source software frameworks, libraries and operating systems shared by robot developers. One such case is the Robot Operating System (ROS), a popular OS used in several robots from multiple vendors, the IOActive researchers said.
The researchers believe that another problem is that in many cases robots make the jump from prototype to commercial product too fast, without any cybersecurity audits and additional protections being built in.
Many of the implications of a hacked robot are similar to those of a hacked IoT device or computer: spying through microphones or cameras, providing a foothold inside internal networks to launch other attacks, exposure of personal data and stored credentials for third-party services. However, due to their kinetic abilities, robots pose other dangers as well.
Inside homes, hacked robots could be used to damage objects and hurt people through sudden movements. They could potentially start fires, unlock doors, deactivate home alarms and more. The same problems could arise from hacked robots in a business environment.
Industrial robots are even more dangerous because they're larger and more powerful than other types of robots. They could easily kill a person and there have been accidents where people have died because industrial robots malfunctioned.
"Many of the cybersecurity issues our research revealed could have been prevented by implementing well-known cybersecurity practices," the IOActive researchers said. "We found it possible to hack these robots in multiple ways, made a considerable effort to understand the threats, and took care in prioritizing the most critical of them for mitigation by the affected vendors. This knowledge enabled us to confirm our initial belief: it's time for all robot vendors to take immediate action in securing their technologies."
This research suggests that until now robot vendors have prioritized getting products out in the market over security. This has happened in other industries as well, like with the internet of things, which has become a big security mess.
If cybersecurity is not taken into consideration at the beginning of a product's lifecycle, fixing vulnerabilities after it's already released is more complex and expensive, the IOActive researchers said. "Fortunately, since robot adoption is not yet mainstream, there is still time to improve the technology and make it more secure."
Share on Facebook Share on Twitter Share on Google Plus

RELATED POSTS


Vivo V9 with dual rear cameras

Xiaomi Redmi 5 launch

Vodafone partners with Tecno to off...
Now Robots are just as plagued by security vulnerabilities as IoT devices Now Robots are just as plagued by security vulnerabilities as IoT devices Reviewed by Latest Govt. Jobs on 22:59:00 Rating: 5

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments ( Atom )

Search This Blog

TEST BOOK FOR GOVT ENTRANCE TEST

TEST BOOK FOR GOVT ENTRANCE TEST
Find All Latest book for preparation of SSC,RAILWAYBANK PO,RBI,BANK CLERK,GATE ME,GATE CE are available here in less prices, to check out the books click here

Translate

  • Popular Post
  • Random posts
  • Category

Popular Posts

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & Earn Offer:  Hey Guys! Today I make an article about Teen Patti Referral ...
  • 11 things you should understand approximately iOS 11
    Apple introduced the following version of its running system for the iPhone and iPad, iOS eleven ...
  • KingRoot 4.8.1 (136) APK Latest Version Download
    Download KingRoot Latest Version 4.8.1 In Tools by Developer KingRoot Studio ( 4.x / 5  average ...
  • How to Disable Your Mac’s Touchpad When Another Mouse Is Connected
    Laptop trackpads can be annoying. Your palm hits them while you’re typing, moving your cursor ...
  • How to Gain Root Access of An Android Device via KingoRoot Software
    What Does Root Access Mean? Gaining root access of Android is the process of modifying the ...
  • Researchers trick 'CEO' email scammer into giving up identity
    Businesses targeted in email scams don’t always have to play the victim. They can actually ...

Random Posts

  • NOBLE SKIODO 80WMVM TWIN TUB 8 KG SEMI AUTOMATIC TOP LOAD WASHING MACHINE
    NOBLE SKIODO 80WMVM TWIN TUB 8 KG SEMI AUTOMATIC TOP LOAD WASHING MACHINE
    22.11.2016 - 0 Comments
    SUMMARY These days’ households cannot find the right help you wash and clean clothes. So technology has…
  • WhatsApp introduces new update to its 'status' feature
    WhatsApp introduces new update to its 'status' feature
    21.02.2017 - 0 Comments
    In lieu of its eighth birthday on February 24, 2017, WhatsApp messenger, the instant messaging…
  • Xiaomi’s Redmi Note 5 vs Redmi Note 5 Pro
    Xiaomi’s Redmi Note 5 vs Redmi Note 5 Pro
    16.02.2018 - 0 Comments
    Xiaomi Redmi Note 5 Pro vs Redmi Note 5: Price in India, top features and specifications of the two new…
  • Latest Samsung Galaxy A5 and Galaxy A7 (2017) launched in India, comes with IP68 certification
    Latest Samsung Galaxy A5 and Galaxy A7 (2017) launched in India, comes with IP68 certification
    06.03.2017 - 0 Comments
    Samsung India has today unveiled two of the Galaxy A-series smartphones, Galaxy…
  • How to Listen Podcasts at Faster and Slower Speeds
    How to Listen Podcasts at Faster and Slower Speeds
    12.03.2017 - 0 Comments
    We all have our favorite podcasts, but we don’t always have time to listen to them. You can however,…

Labels

Android Apk Files Android Apps Android Games Apps Apk Files Apps Hack Tricks Entertainment Free Internet Freecharge Gadgets Games Apk Files How To's Laptops Guide Mobiles Reviews Technology Viral's android zone free recharge

Entertainment

Tricks

Popular Posts

  • Infocus Vision 3 review
    What happens when ...
  • How to Disable Your Mac’s Touchpad When Another Mouse Is Connected
    Laptop ...
  • Researchers trick 'CEO' email scammer into giving up identity
    Businesses ...
  • How to Gain Root Access of An Android Device via KingoRoot Software
    What Does Root ...
  • Tinyowl Freecharge Offer – Get 15% Cashback + extra 25% cashback using Freecharge [Ultimatez Tricks]
    Tinyowl Freecharge ...
  • (no title)
    ...
  • EVGA redesigns its graphics cards following overheating concerns
    Following a ...

Random Posts

  •  NEW AMD Ryzen finally makes octo-core processors affordable
    NEW AMD Ryzen finally makes octo-core processors affordable
    22.02.2017 - 0 Comments
    After months of rumors , leaks and teasing from AMD…
  • New Google Assistant Coming to Newest Android Operating Systems
    New Google Assistant Coming to Newest Android Operating Systems
    05.03.2017 - 0 Comments
    In some good news, Google has announced that the Google Assistant is soon to be available on Android…
  • Samsung Galaxy Tab S3 (2017) review
    Samsung Galaxy Tab S3 (2017) review
    28.02.2017 - 0 Comments
    VERDICT The Tab S3 has a lot in common with 2015's slate, with some good spec upgrades. The…
  • 10 Random things you're satisfied To discover inner Your preferred ebook
    10 Random things you're satisfied To discover inner Your preferred ebook
    23.05.2016 - 0 Comments
    There are those bookworms who are eternal e-reader cheerleaders, and then there are those — dare I say…
  • Buy UNBOXED Lenovo K3 Note-K50a40 (White, 16GB) in just 8990/-
    Buy UNBOXED Lenovo K3 Note-K50a40 (White, 16GB) in just 8990/-
    06.04.2016 - 0 Comments
    - Unboxed Product- Screen Size (in cm)13.97cm (5.5)          - Front…

Most Popular

  • Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Offer 2018: Refer and Earn Flipkart Vouchers Free
    Teen Patti Refer & ...
  • SAMSUNG GALAXY J7 (2016) REVIEWS
    SAMSUNG GALAXY J7 (2016) REVIEWS
    SAMSUNG GALAXY J ...
  • Top 5 Best SmartPhones under 7000 Rs (March 2017)
    Looking for the ...
  • Apple, IBM, Cisco are huge because of Indians, do not deny them H-1B visa: RBI Governor Urjit Patel
    ...
  • SAMSUNG GALAXY J7 (2016) Specifications
    SAMSUNG GALAXY J ...
  • BlackBerry Teases Marshmallow Beta Testing for Priv by Next Week
    Blackberry ...
  • LG Q6 Review
    LG Q6 Review
    2017 is ...

Contact Form

Name

Email *

Message *

Offers Zone

Created By Android Century Distributed by Android Century
  • Home
  • About us
  • Contact us
  • Privacy policy
  • Terms of use
  • Advertise here
Subscribe Via Email Subscribe To Android Century By Email And Get Free Updates. ;-)


Your email address is safe with us!