. Military Space News .
CYBER WARS
Hackers may hit home for the holidays
By Rob Lever
Washington (AFP) Nov 22, 2015


It could be a merry holiday season for hackers, with millions of new and potentially vulnerable Internet-connected gadgets hitting the market.

Security experts say the vulnerabilities of "Internet of Things" devices such as fitness bands, smartwatches, drones and connected appliances could be exploited as consumers adopt these products for the holiday season.

Any connected device "can be a pivot point into your network," said Bruce Snell, cybersecurity and privacy director for Intel Security.

Although breaking into a wearable device or drone does not necessarily provide immediate value for a hacker, it can lead to a connection to a smartphone and data which is stored in the Internet cloud, security experts note.

"These could potentially install malware that sniffs out all the passwords on your network and sends them to a remote location," Snell told AFP.

For easier use, many consumer gadgets use relatively insecure connections and often require minimal use of passwords or other authentication.

Gary Davis, who heads consumer online safety for Intel, said the holidays could be a vulnerable time for consumers and a time for hackers to celebrate.

"With the excitement of getting new devices, consumers often are so eager to begin using them that they do not take time to properly secure them," he wrote.

In some cases, security can be improved by simply changing the password on the device, which may be something as simple as 1234 or 0000, but many people fail to do this.

"When you get that shiny new toy for Christmas, you want to just get it working," said Alastair Paterson, chief executive at the security firm Digital Shadows.

- Exposing documents -

Paterson noted that with a blurring of lines between work and leisure time, many people take home sensitive corporate material that can be then stored in a hackable home network.

In some cases, Paterson said, "just by connecting it to the home Wi-Fi network, they are exposing documents to the entire Internet."

The research firm Gartner earlier this month forecast that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020.

Juniper Research predicts "smart toy" sales will hit $2.8 billion this year, while noting that "vendors will likely require third-party software expertise to avoid PR disasters caused by hackers."

Smart home devices such as thermostats can be a gateway for hackers, according to a report this year by researchers at TrapX Labs.

The researchers took apart and then used a Nest thermostat as a point of attack for a home network and were able to track the users' Internet surfing activity and get access to their private credentials.

The report said that even though Nest "is relatively secure," there is a concern "that the manufacturers of IoT devices at all points in the supply chain do not seem to have the economic incentives to provide initial cybersecurity... the manufacturers involved with IoT are obsessed with cost-cutting and minimal design footprints."

Northeastern University researchers found some smartphone fitness apps can leak passwords and location information over public Wi-Fi networks.

"Our devices really store everything about us on them: who our contacts are, our locations and enough information to identify us because each device has a unique identifier number built into it," said computer science professor David Choffnes, who led the study, which also developed a system to detect and fix data leaks.

- Put on the kettle -

Researchers at British security firm Pen Test partners said a similar vulnerability exists in Wi-Fi connected kettles and coffee-makers.

The devices allow users to turn the kettle on without getting up but it also means "a hacker can drive past your house and steal your Wi-Fi key," Pen Test's Ken Munro said in a blog post last month.

"If you haven't configured the kettle, it's trivially easy for hackers to find your house and take over your kettle."

California-based security firm Veracode found vulnerabilities in many smart home hubs that control systems such as garage doors or lighting.

Its study noted that cybercriminals could turn microphones on and listen to conversations or get notifications when a garage door is opened or closed, offering an opportunity to break into a given house.

A US Federal Trade Commission report highlighted the numerous risks for connected devices, while recommending that companies "build security into their devices at the outset."

The FTC also said companies "should limit the data they collect and retain, and dispose of it once they no longer need it" to minimize privacy risks.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
In fight on terror, encryption is double-edged sword
Washington (AFP) Nov 21, 2015
Encryption can be a terrorist's tool. But it's also a key for those hunting attackers, and for many others. The technology for encryption can keep data and conversations private, making it a double-edged sword that can equally be used by democracy campaigners, law enforcement or violent extremists. The November 13 attacks in Paris spurred calls for better tools for investigators to track ... read more


CYBER WARS
Poland's new govt rethinks Patriot missiles, Airbus choppers

Patriot takes out two ballistic missiles in latest test

Army system integrates different radars for Patriot-3 interceptor

Putin: Russia Has Weapons Capable of Penetrating Any Missile Defenses

CYBER WARS
A Tornado With Rockets: New Russian Launch Vehicles Get Guided Missiles

US has 'concerns' over Russian missile system: US official

Navy, Boeing test new Harpoon missile variant

Hundreds of TOW missiles tipped for sale to Morocco

CYBER WARS
CACI launches SkyTracker UAV detection system

Japan to acquire Global Hawk drones

Former operators speak out about US drone killings

Navy starts pre-Milestone C tests on MQ-4C Triton UAS

CYBER WARS
Australia contracts for defense computer network upgrades

Harris Corporation Wins $40 Million Air Force Satellite Control Network Contract Extension

Commercialization is coming to WGS

DARPA's RadioMap Program Enters Third Phase

CYBER WARS
U.S. Air Force orders more JDAM bomb kits

U.K. awards Cook Defence Systems contract for armored vehicle tracks

Rockwell Collins opens new facility in India

Tank Killer: New Armata gets really big gun

CYBER WARS
British PM David Cameron announces boost in defense spending

US approves $1.29 bn sale of bombs to Saudi Arabia

New York City turns tide on homeless vets

Orbital ATK and Boeing open offices in UAE

CYBER WARS
Putin inaugurates museum honouring ex-leader Yeltsin

China under fresh fire over sea rows as US courts SE Asia

Japan backs US South China Sea operations

Under junta rule, Thailand pivots towards China

CYBER WARS
Navy researchers recruit luminescent nanoparticles to image brain function

Light wave technique an advance for optical research

Nanostructuring technology can simultaneously control heat and electricity

Rice makes light-driven nanosubmarine









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.