Hackers attack the casino through a hole in the smart thermometer of the aquarium
Hackers have found a flaw through a smart thermometer that is used to monitor water in aquariums in the middle of the hall to penetrate the system and get information from the casino.
According to Nicole Eagan, CEO of network security company Darktrace, after infiltrating the casino's intranet via a smart thermometer, bad guys have found the personal information of some of the most spending customers. in the casino then take the data out in the way that was entered, then upload it to the cloud storage system.
Giant aquarium fish tank in a casino.(Photo: Casinohire.)
Eagan said that smart devices like lights, thermometers, cooling systems or devices that support Alexa, . appear more and more everywhere, making people more vulnerable to cyber attacks. . And this rare attack is a good example of possible risks.
The reason is that the current IoT devices are not protected by traditional defense systems. They are very basic design, do not include additional security features in addition to the popular WPA2 protocol of Wi-Fi networks. And even that is not a perfect security class.
Of course, researchers are trying to improve IoT devices so that they become more and more secure, but that is not enough to distance themselves from the hackers' eyes.
See more:
- It turns out this is how hackers attack your computer through the main screen
- Vietcombank's website was hacked, showing two poetic sentences about student life
- The emergence of poetry on Vietcombank website is caused by 'negligence technical staff', not hacked
You should read it
- How is it called 'smart device'?
- Errors on mobile applications allow hackers to control LG devices
- The rise of Botnet IoT and how to protect smart devices
- Number of keyloggers increased by 65%
- Classify hackers and career opportunities for true hackers
- Do you know who white hat hackers are and how their lives are?
- How will smart home equipment be lost?
- Smart home technology and unpredictable hazards
May be interested
- It turns out this is how hackers attack your computer through the main screenthe video clearly shows how he entered the user's computer through the main screen, creating a vulnerability on the computer to steal personal information. in this way, the hacker can even change the amount of money in the user's bank account.
- Hackers publish Windows attack codemicrosoft on october 28 has advised its customers that the vulnerabilities that attack the windows operating system are released by hackers.
- Hackers can use Ransomware to attack and control robotsioactive, an american security consulting firm, recently launched an attack to prove that hackers can not only use ransomware to attack computers to make ransom, but also attack complex robot systems. are being used in many areas.
- What is SS7 attack? What can hackers use it for?an ss7 attack is a very dangerous attack method. an ss7 attack can be used to bypass two-factor authentication. so what specifically is the ss7 attack? what can a hacker do with an ss7 attack?
- black hole, white hole, deep holea black hole is a concept that is no longer new to most astronomers and physicists. in this article i will try to write in a short and understandable way possible about the concepts: black holes, white holes and deep holes.
- The Linux vulnerability series is more than '15 years old', allowing hackers to hijack root privilegesvulnerabilities are currently being tracked with identifiers cve-2021-27365, cve-2021-27363, and cve-2021-27364.
- What is Smurf Attack? How to prevent Smurf Attack?smurf attack is a type of ddos attack, hackers will attack the victim's server by sending fake ip requests using internet control message protocol to create fake accesses that overload the target device or network.
- Clean the aquarium yourself thanks to symbiotic relationships between fish and plants in the tanka new innovative product we want to mention is ecoqube c +.
- Discover the most bizarre black holes in the mysterious space universeblack holes exist in many different forms, from the oldest black hole that was born 770 million years after the big bang or the largest black hole has billions of times the mass of the sun. here is a list of the 10 most typical black holes in the universe that people have ever known.
- Top 10 brilliant hackershere are 10 hackers who attacked and caused the most serious consequences ever known in the history of the internet.