The National - News

‘Smart’ devices make great strides – but are they now capable of thwarting cyber-crime?

- ALKESH SHARMA

Remote start-up of your washing machine, monitoring your home while sitting in the office or tracking your dog through a connected collar seem like 2019-appropriat­e things to do – but not if they also extend an invitation to cyber criminals.

Technology giant Cisco estimates that the number of Internet of Things devices – the core to “smart” living – will be three times as high as the UN’s predicted 8 billion global population by 2021.

The consumer segment accounts for the biggest number of connected devices with 5.2 billion units in 2017 This represents 63 per cent of the overall number of applicatio­ns in use, according to Gartner research.

Gartner expects IoT security-related spending to reach almost $3.1 billion by 2021. Hewlett-Packard, meanwhile, said that 70 per cent of IoT devices are vulnerable to hacking.

Here, The National considers the vulnerabil­ity of smart devices used in homes.

Criminals controllin­g your home

By using botnets, which are networks of computers carrying malicious software, hackers can gain access to a person’s internet network and take control of smart devices to which it is connected. For example, from an IoT-connected front door, criminals can collect informatio­n about a person’s routine – when he or she is leaving for work, coming back and going out again, for example – and predict their future movements.

They can also control sensor settings and deactivate anti-theft alarm systems.

5G adds to vulnerabil­ity

In the coming months, more 5G-enabled IoT devices will connect directly to the network rather than via a Wi-Fi router – a trend that will make those devices more exposed to direct cyber-attacks.

“For home users, it will also make it more difficult to monitor all IoT devices since they bypass a central router,” said Hugh Thompson, chief technology officer at Symantec, a California software company.

More broadly, the ability to back up or transmit vast volumes of data easily to cloudbased storage will give hackers rich new targets to attack, added Mr Thompson.

System hijacking

By compromisi­ng a single smart device, hackers can gain control over all other connected devices at home.

They can even change passwords, restrict the use of devices and corrupt all the hardware. In most cases, a victim is unable to detect the compromise­d device because it continues to appear to function normally.

Identity theft

Users can tell devices such as Amazon’s Alexa to turn on the TV, ask Google Assistant to pay for a meal or book an Uber ride, direct Apple’s Siri to get weather reports and even get menus translated by Samsung’s Bixby

But data generated from unprotecte­d devices exposes personal informatio­n like credit card details and confidenti­al passwords.

 ??  ?? Apple’s iPhone XR is among the latest wave of phone models that will connect with ‘smart’ living
Apple’s iPhone XR is among the latest wave of phone models that will connect with ‘smart’ living

Newspapers in English

Newspapers from United Arab Emirates