The fun with IoT devices never stops! The larger the attack surface...

26일 전

image.png
IMG SRC

I just read this recent article here:

https://threatpost.com/hacker-leaks-more-than-500k-telnet-credentials-for-iot-devices/152015/

This will continue to be the most rapid growing of attack surfaces in cyber security.

Non IT businesses throwing "connected", webified stuff in the market because it's the "new thing" to make it all "smart".

Sadly their lacking of even most essential protective measures will continue to let risks grow for all of us.


Why? A little example...

Primary victims can very well be the cause for secondary breaches like your friends that "hopped" on the "smart home everything" train, thus saving a few bucks to buy their stuff for cheap directly from China via Aliexpress for instance.

Little did they know that they invited bad actors into their homes, via easily breachable interconnected smart home devices, compromising not only their own data but possibly contact info and other sensitive data of their friends as well.


IoT will be the arena with the most cyber exploit potential in the foreseeable future.

Stay frosty out there my friends!

Cheers!
Lucky

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
STEEMKR.COM IS SPONSORED BY
ADVERTISEMENT
Sort Order:  trending

Hello dear @doifeellucky.

Friend I've run out of words!

Did that really happen with devices purchased from China?
This could be a negative vote for the adoption of IoT.

No one will be willing to sacrifice their privacy that way. I think that identity theft in phones, laptops and tablets is enough. Now they want to enter in such a rude way the physical spaces of our homes?

This is unacceptable.

·

Hello Juan,

there are loads of stories regarding weakness riddled IoT devices.

The most drastic issues is the fact that once they are breached you'll mostly find little linux distributions as os'es on them. From there it's sometimes quite easy to use them as "bridgeheads" to further investigate the environment of the victims to cause further damage.

The problem is that many of the "for cheap" available stuff might be working in some way like the originals they were "knocked off of" minus adequate security measures.

Especially with surveillance tech from China there are many out there that again and again made headlines because you can take control of these on a script kiddie level even.

Cheers!
Lucky

·
·

I would like to ask you a favor. You may have a couple of minutes to check a link that I will leave you.

We have been working on the launch of our own curation trail for our project @project.hope of which I am co-founder and is currently in ... let's call it: experimental phase.

https://steemit.com/steemit/@coach.piotr/project-hope-and-curation-trail-on-steemauto-com-brainstorming

Please let me know what you think and leave a comment whenever you can. Your opinion is a gold mine for me.

Thanks in advance

·
·
·

Did it! Adjusted my settings in steemauto to the project hope curation trail. Cheers!

·
·
·
·

You never cease to surprise me with how collaborative you are.
Thank you very much for your great support. You are definitely a main member of project hope.

·
·
·
·
·
·
·

You want to tell me that it is not the manufacturers who have these spy features in the devices?

Are software failures which are exploited by a kind of jackers?

This is interesting.

Government control of the Chinese government over its citizens goes beyond what we can imagine. I am able to believe that these "failures" are really new ways to domination.

·

Forgot to link you this very interesting article on some of the "2019 IoT disasters"...

https://threatpost.com/top-10-iot-disasters-of-2019/151235/

·
·

Thanks for that link.