Internet of Things & Wearable Technology Insights
8.1K views | +1 today
Follow
Internet of Things & Wearable Technology Insights
Internet of things and wearable technology insights, research, innovations & product news
Curated by Jeff Domansky
Your new post is loading...
Your new post is loading...
Scooped by Jeff Domansky
Scoop.it!

This security camera was infected by malware 98 seconds after it was plugged in

This security camera was infected by malware 98 seconds after it was plugged in | Internet of Things & Wearable Technology Insights | Scoop.it
Here’s an object lesson on the poor state of the so-called Internet of Things: Robert Stephens plugged a Wi-Fi-connected security camera into his network and it was compromised in… 98 seconds.

Stephens, a tech industry veteran, wasn’t so naive as to do this without protecting himself. It was walled off from the rest of the network and rate-limited so it couldn’t participate in any DDoS attacks.

He monitored its traffic carefully, expecting to see — as others have — attempts to take over the device. But even the most jaded among us probably wouldn’t have guessed it would take less than two minutes.
Jeff Domansky's insight:

Here's a cautionary tale about IoT devices, and the risk of malware and other security issues.

No comment yet.
Scooped by Jeff Domansky
Scoop.it!

Connected kettles boil over, spill Wi-Fi passwords over London

Connected kettles boil over, spill Wi-Fi passwords over London | Internet of Things & Wearable Technology Insights | Scoop.it

A security man has mapped and hacked insecure connected kettles across London, proving they can leak WiFi passwords.

The iKettle is designed to save users precious seconds spent waiting for water to boil by allowing the kitchen staple to be turned on using a smartphone app.

Pen Test Partners bod Ken Munro says hackers can make more than a cuppa, however: armed with some social engineering data, a directional antenna, and some networking gear they can "easily" cause the iKettle to spew WiFi passwords.

"If you haven’t configured the kettle, it’s trivially easy for hackers to find your house and take over your kettle," Munro says. "Attackers will need to setup a malicious network with the same SSID but with a stronger signal that the iKettle connects to before sending a disassociation packet that will cause the device to drop its wireless link....

Jeff Domansky's insight:

Great story about the potential security issues with IoT products. it highlights how did simple it is to hack devices that are poorly or not configured or password-protected. Who'd a thought? Invasion of the connected kettles?

Richard Platt's curator insight, October 28, 2015 7:17 PM

A security man has mapped and hacked insecure connected kettles across London, proving they can leak WiFi passwords.  The iKettle is designed to save users precious seconds spent waiting for water to boil by allowing the kitchen staple to be turned on using a smartphone app.  Pen Test Partners bod Ken Munro says hackers can make more than a cuppa, however: armed with some social engineering data, a directional antenna, and some networking gear they can "easily" cause the iKettle to spew WiFi passwords.  "If you haven’t configured the kettle, it’s trivially easy for hackers to find your house and take over your kettle," Munro says. "Attackers will need to setup a malicious network with the same SSID but with a stronger signal that the iKettle connects to before sending a disassociation packet that will cause the device to drop its wireless link....

Scooped by Jeff Domansky
Scoop.it!

Who Will Step Up To Secure The Internet Of Things?

Who Will Step Up To Secure The Internet Of Things? | Internet of Things & Wearable Technology Insights | Scoop.it

The Internet of Things (IoT) presents a significant mix of opportunity and risk. Compared to the connected devices of the past, the gazillions of new IoT devices that are being predicted for our homes, transportation, cities, medical devices and elsewhere represent a unique set of security challenges for both companies and their users.

They also offer a host of new and attractive opportunity for attackers.

To start, IoT devices significantly expand the attack surface. Hackers can easily purchase any IoT device, which will often contain the same security features of other, identical devices already deployed in hundreds or even thousands of homes. Unlike servers or networking equipment, which are usually hacked through remote access points and reside in protected and monitored environments, IoT devices are more accessible to malicious threat actors....

Jeff Domansky's insight:

Proliferation of devices leads to higher risk. Many IoT challenges ahead.

Jeff Domansky's curator insight, October 3, 2015 9:36 PM

Proliferation of devices leads to higher risk. Many IoT challenges ahead.

Scooped by Jeff Domansky
Scoop.it!

Hacked Cameras Were Behind Friday's Massive Web Outage

Hacked Cameras Were Behind Friday's Massive Web Outage | Internet of Things & Wearable Technology Insights | Scoop.it

We already know at least one method the hackers are using. According to security intelligence firm Flashpoint, their researchers have observed a Mirai botnet attacking Dyn. Flashpoint researcher Zach Wikholm had identified two kinds of device that were used in the DDoS. The first was a DVR running the software of the Chinese company previously-identified as being a key target of the Mirai hackers – Hangzhou XiongMai Technologies (XM). The other was a network-attached storage device with a username and password of “root/root”.

Roland Dobbins, principal engineer at Arbor Networks, agrees: ”A significant proportion of the DDoS attack traffic targeting Dyn is being sourced from compromised IoT devices participating in Mirai botnets.”...

Jeff Domansky's insight:

Compromised IoT devices contributed to some of the global DDoS attacks.

No comment yet.
Scooped by Jeff Domansky
Scoop.it!

Easily Hacked Tea Kettle Latest To Highlight Pathetic Internet Of Things 'Security' | Techdirt

Easily Hacked Tea Kettle Latest To Highlight Pathetic Internet Of Things 'Security' | Techdirt | Internet of Things & Wearable Technology Insights | Scoop.it

We've discussed at length that companies rushing to embrace the "Internet of Things" (read: networked devices for those of us not in marketing) tend to have completely forgotten a little something called device security. As a result we're now bombarded week after week with stories about cars that can be controlled remotely, televisions that share your unencrypted living room conversations with anybody on the Internet, and refrigerators that leave the door wide open to having your e-mail password stolen. Some of these are kind of cute exploits, but many of them could be potentially fatal.

While these companies are desperately trying to highlight the wonderful future of Internet connected devices, they've inadvertently been creating advertisements for why many devices should just remain stupid. Especially if you're going to cut corners in development so device security is an afterthought, or cut corners post release when it comes to quickly identifying and patching exploits.

The latest case in point: the $150 iKettle by UK company Smarter promises to save its users "two days a year in wasted waiting time" over traditional tea kettles. How? Users can remotely turn the kettle on from anywhere via smartphone app, potentially letting users walk into the house just as the kettle comes to a boil. Avoiding the horrible task of having to walk a few feet and wait a few minutes is the pinnacle of modern engineering to be sure; the problem is that for the better part of this year researchers have been noting that the security on the kettle was virtually nonexistent...

Jeff Domansky's insight:

Here's a look inside the challenge of security for Internet of things products.

Richard Platt's curator insight, October 28, 2015 7:21 PM

More detail on the tea kettle that can be hacked and understand how this thing called WiFi technology needs a bit more robustness to mitigate the threat of being hacked.  Read on.