Oman Daily Observer

Watch out in a world of connected objects, cyber experts warn

-

PARIS: The massive global cyber attack that wreaked havoc in computer systems earlier this month caused plenty of visible disruption, not least in Britain’s National Health Service.

But in the brave new interconne­cted world heralded by the Internet of things (IoT), so-called “ransomware” attacks could have as their source something quite mundane and yet present in ever more modern households.

In a not so far-off future, the source of a software glitch with serious consequenc­es for the simple consumer could be anything from a connected coffee machine or refrigerat­or to a techie television.

Web-connected gadgets are becoming all the rage with tech-aware profession­als.

But the mere idea that it only needs a hacker to give the software a malevolent tweak to send them on the blink with disastrous consequenc­es may yet threaten the developmen­t of such goods’ popular take-up.

“Regarding last weekend’s attack there is no risk for connected objects. That in particular hit systems running Windows... and today there are no mass market gadgets with Windows loaded in order to function,” says toy or an outsmart-you Gerome Billois, Wavestone.

“In contrast, there have already been massive attacks on connected objects,” Billois said.

The Mirai malware strain made from hacked IoT devices including badly secured routers and Internet connected cameras recently infected hundreds of thousands of poorly secured connected objects.

The idea was not to stop them from working but to transform them into zombies or botnets with a view to using them as relay stations for future cyber attacks.

Last week at a timely cyber security a consultant with conference in The Netherland­s, American wunderkind Reuben Paul, just 11, stunned an audience of security experts by hacking into a teddy bear via bluetooth to show how interconne­cted smart toys “can be weaponised”.

His prowess showed just how easy it is for tech savvy individual­s to use everyday objects to harvest data or use them as spy holes for covert surveillan­ce.

According to documents released in March by Wikileaks, US intelligen­ce can hack smartphone­s, computers and smart, web-connected TVs, to pilot them and eavesdrop.

 ?? — Reuters ?? A major wave of cyber attacks hits dozens of countries around the world earlier this month.
— Reuters A major wave of cyber attacks hits dozens of countries around the world earlier this month.

Newspapers in English

Newspapers from Oman