7 scary things about IoT really happened
These manufacturers and retailers have little interest in revealing the hidden corners of IoT. The following article will tell readers about a series of scary facts caused by Internet-connected devices.
Internet of Things (IoT for short) provides a connected world for wireless devices. Manufacturers and retailers are always looking for ways to advertise the convenience of controlling homes, cars, medical devices, etc. from smartphones or computers.
But these manufacturers and retailers have little interest in revealing the hidden corners of IoT. The following article will tell readers about a series of scary facts caused by Internet-connected devices.
The "corners" of IoT may not be known to you
- 1. The camera provides incorrect nuclear missile alerts
- 2. Botnets are made up of malware-infected IoT devices that "take down" websites
- 3. Bulb 'share' WiFi password
- 4. Thermometer sharing casino customer data
- 5. Smart speaker records private conversations
- 6. Transplanted heart devices may have been hacked
- 7. Hackers control jeeps
1. The camera provides incorrect nuclear missile alerts
Imagine one day you're sitting watching football. Suddenly an emergency broadcast warns that intercontinental ballistic missiles are heading to three different regions in your country. The children are extremely scared, and you try to find out what happens.
This is not a baseless hypothetical situation that actually happened to a family living in Orinda, California. No one else is the Nest security camera on TV. Someone had access to the device's login information and hoax this family.
The number of reports about such jokes has increased as people buy WiFi-enabled cameras from Nest and other companies. A Houston couple heard a voice threatening to kidnap in their children's room.
2. Botnets are made up of malware-infected IoT devices that "take down" websites
Sometimes when a user is unable to access a website, it is likely that the site is experiencing a distributed denial of service (DDoS) attack. A powerful device, or a network of devices, is attacking the site with more traffic than the page can handle.
By the end of 2016, a massive DDoS attack was aimed at systems operated by Dyn, the DNS provider. Dyn's job was to connect the web address the user entered into the browser with the pointing IP address. to a website.
If the DNS function is blocked, users cannot access dozens of highly configurable websites such as Amazon, GitHub, Netflix, Twitter and Zvel.
At that time, this was the largest DDoS attack recorded. The culprit is a giant botnet of IoT malware infected with Mirai.
3. Bulb 'share' WiFi password
IoT devices seem simple. That's part of the manufacturer's marketing strategy: Make life simpler by buying a more manageable product. But to connect to the Internet, these products must have all the necessary code, like a regular computer.
The problem is, while the laptop operating system is always trying to protect user data, most IoT devices don't do it.
Limited Results has found that a white LIFX Mini light bulb does not make any effort to protect WiFi networks and user-supplied passwords during setup. Instead, it stores data in plaintext form (the format that text editors, such as Microsoft Notepad, uses).
Anyone who can pick up this old light bulb in a trash can or steal a light that is being used on the porch can access your home network.
4. Thermometer sharing casino customer data
When operating a business, you not only have to protect your own data but also protect your customers' data.
In 2018, the database of a casino has been violated. According to a report by Business Insider, hackers managed to access the casino's network through a smart thermometer that monitored the water temperature of the aquarium in the lobby.
When hackers gain access to the network, they find the database containing the most spending information and other private details.
5. Smart speaker records private conversations
A few years ago, smart speakers were also a new concept. Now devices Amazon Echo, Google Home and Apple HomePod have appeared in many homes around the world.
These devices have similar functions. They provide owners with the ability to receive weather reports, search for real information, listen to music and control indoor parts. Users interact with these gadgets by voice.
In order to detect the owner's voice, these devices must be 'heard' continuously. Companies promise a lot of privacy, but there are many cases of smart speakers recording and uploading private conversations.
For example, a Seattle news station reported on the woman in Portland receiving a call from an anonymous phone number, attaching a recording from her Amazon Echo.
6. Transplanted heart devices may have been hacked
In 2017, the FDA has confirmed that St. John's heart implants. Jude has vulnerabilities that can be hacked. As CNN reported, the problem lies with the device's remote data sharing transmitter with doctors.
If a hacker exploits the vulnerability and has access to the device, they can deplete the battery, change speed or cause shocks. The fact that devices help prevent hacked heart attacks can cause even more problems.
Fortunately, St. Jude has released a fix. However, if the device is still connected to the network, the risk still exists.
7. Hackers control jeeps
When buying a new car, Internet connectivity is often one of the features offered by sellers. Cars can download maps, stream music or act as hotspots for other devices in the car.
Unfortunately, car companies don't know how to secure their vehicles or simply aren't willing to spend money on this. Hackers pointed to Wired reporters how to control the parts of a remote Jeep.
In the coming years, the number of Internet-connected devices is expected to increase to billions. When many poor security devices are put to use, hackers will definitely not ignore this lucrative 'prey'.
The situation has become so bad that the Japanese government has to find ways to warn its citizens about the severity of the situation. In February 2019, Japan began exploring 200 million IP addresses to search for domestic devices with poor security.
Topics like Internet of Things can be a bit complicated to learn. The easiest way to stay safe is to stay away from utilities that call yourself 'smart' and find out what the Internet of Things really is.
You should read it
- 6 things to know about IoT security
- What is the Internet of Things (IoT) or the connected Universal Network?
- 10 interesting things first happened on the Internet
- Discover IoT trends in 2020
- What is Internet of Robotic Things?
- What is Industrial Internet of Things (IIoT)?
- Top 7 Scariest Children in Game World
- 6 things 'love and hate' of Internet Explorer 9
- How can IoT help you enjoy 4.0-style meals?
- The alarming increase in the number of attacks targeted at IoT devices
- Pokemon Go suggests 3 important Insight on sales and marketing
- Internet of Things - opportunities and challenges for businesses
Maybe you are interested
How to create a GameTV Plus account quickly to play AOE, CS 1.1 online Instructions for installing GameTV Plus on the computer to play AOE, CS 1.1 online Top the best phone repair addresses in Hanoi Complete tutorial of Excel 2016 (Part 6): Change the size of columns, rows and cells Instructions on how to type Vietnamese on Sticky Notes 5 types of hair that are both beautiful and suitable for going to play with Noel but she always ends up