T3

connected-home safety risks

Can smart tech threaten your home?

-

Hacker skills

Just about every device that maintains a persistent connection to the internet is, or will be, a target for hackers. Not necessaril­y in a malicious context – usually, the challenge for the hacker is simply to gain full access to a device to be able to run commands on it; they’re unlikely to be able to glean much useful personal informatio­n from your connected lamp. Embedded software lockouts mean the vast majority of device hacks must be performed on the device directly, usually by disassembl­ing it and probing its circuitry.

The dangers

Your lamp might not be a target, but there are devices in your home that could be. IP cameras, for instance, could give criminals informatio­n about your comings and goings, or the kit that’s in your home; your coffee maker, if properly compromise­d, could start a fire. But none of these devices will be nearly as interestin­g to the random attacker as your router is, and if you use them sensibly – never publicly hosting an IP camera next to your personal details, for example – you’re very unlikely to be a target.

Preventati­ve measures

Since direct device access is critical for installing most meaningful hacks, consider very carefully if buying secondhand gear is worth the risk of it coming pre-compromise­d. Inspect security tabs for signs of entry. Always buy from reputable brands you trust, as that hastily constructe­d off-brand kit could well have software errors that could be exploited. And, where possible, protect your connected devices with strong passwords.

Newspapers in English

Newspapers from Canada