The Asian Age

HTC has started rolling out the Android 8.0 Oreo OS update for its flagship U11 smartphone­s

By hacking the IoT devices, criminals are able to blackmail people or spy on them

-

Imagine that you wanted to treat your child and so decided to buy him an amazing smart app- controlled wireless spy vehicle — essentiall­y a spy camera on wheels, connected via Wi- Fi and managed via a mobile applicatio­n. It is truly an amazing present that allows him to not only drive it around but also take photos, record videos and even play audio remotely via a built- in speaker. Not to mention the fact that it was Cyber Monday so you were able to get it at a bargain price!

It was perfect to get you in the festive mood, but several days after purchasing the vehicle you suddenly started to notice that something was wrong and the vehicle went out of control. It appeared to be obeying someone else’s commands, record video you did not want and lose charge unexpected­ly fast. How did this happen? Most likely, it is because you bought a vulnerable and insecure gift.

Connected smart devices are generally considered to be a very convenient way to make our lives easier. But to what extent are they safe to use from a cybersecur­ity point of view? In 2015, Kaspersky Lab researcher­s decided to examine the severity of the threat behind the Internet of Things ( IoT). The results were concerning, so two years later they conducted more research into the area. Of eight randomly selected IoT devices — ranging from a smart iron to a smart spy vehicle — half were hackable due to weak password settings. Moreover, only one device satisfied the researcher­s’ requiremen­ts and proved to be secure.

IoT devices are basically devices with network connectivi­ty — equipped with embedded technology that allows them to interact with each other or the external environmen­t. Because of the large number and variety of devices available, the IoT has become an attractive target for cybercrimi­nals.

This also include, among others, the record- breaking DDoS attacks of 2016 that were launched with the help of a massive botnet made up of routers, IP cameras, printers and other devices. By successful­ly hacking IoT devices, criminals are able to blackmail people or spy on them. Other vectors can be even more dangerous. For example, your home network devices could be used to perform illegal activities, or a cybercrimi­nal who has gained access to an IoT device could blackmail — and spy on — its owner or extort money from him. The infected device can also simply be broken, though clearly, this is by no means the worst thing that can happen to someone.

With this in mind, researcher­s at Kaspersky Lab decided to find out whether the reports on smart ‘ IoT’ products and the incidents that have occurred have changed the security situation. To uncover the answer, they once again analysed several randomly selected smart devices, consisting of a smart charger, an appcontrol­led toy car, smart receivers, a smart scale, a smart cleaner, a smart iron, a smart camera and a smartwatch. The findings were truly worrying: of the eight examined devices, only one satisfied the researcher­s’ security requiremen­ts. What’s more, half of the devices could be compromise­d and simply exploited due to a lack of vendor vigilance in the password settings. This included having a default password and an inability to change the password, while in some cases the password was even unified for all the devices in the product line. Therefore, it is advised to take the following measures in order to protect themselves from buying v u l n e r abl e smart devices: 1. Now before buying an IoT device, search the Internet for news of any vulnerabil­ity. It is likely that the device you are going to purchase has been already examined by security researcher­s and it is often possible to find out whether the issues found in the device have been patched or not.

2. It is not always a good idea to buy the most recent products released on the market. Along with the standard bugs commonly found in new products, recently- launched devices are more likely to contain security issues that haven’t yet been discovered by security researcher­s. The best choice is to buy products that have already been through several software updates.

3. When choosing which part of your life you’re going to make that little bit smarter, consider the security risks. If your home is the place where you store many items of material value, it would probably be a good idea to install a profession­al alarm system that can complement your existing app- controlled home alarm system; or set- up the existing system in such a way that any potential vulnerabil­ities will not affect its operation.

 ??  ??

Newspapers in English

Newspapers from India