Hackers now threaten online refrigerators to "smart" toothbrushes!

89801ADAE42614334E46C9B8DE1AD0C8 Hackers now threaten online refrigerators to "smart" toothbrushes!Any device, now or in the future, has an online interface (over computers, tablets or "smartly» κινητά), αποτελεί μέρος του συνεχώς διευρυνόμενου « των πραγμάτων»

Hackers who until now "had their eye" on computers and mobile phones, sooner or later will begin to turn their attention to the entire so-called "Internet of Things", i.e. to every "smart" device connected to the Internet, from its refrigerator kitchen to the toothbrush in the bathroom and the digital glasses we will wear in the future. The warning comes from cyber-security experts on the occasion of this year's big international electronics CES in Las Vegas, USA, which just ended and in which the "Internet of Things" took center stage.

Anyone device, now or in the future, has an online interface (beyond computers, tablets or "smart" phones), is part of the ever-expanding "internet of things". As for the clothes, the a, workplaces (offices and factories), private and public spaces in general are becoming more and more "smart", so the "internet of things" will expand and its digital territory will cover an ever larger area, which will makes it an increasingly attractive target for hackers.

"If an object is connected to the Internet, one can find it, and if it has one σύστημα, τότε μπορεί να πέσει θύμα χάκερ» δήλωσε ο Κέβιν Χέιλι, διευθυντής της εταιρείας κυβερο-ασφάλειας Security, σύμφωνα με το Γαλλικό Πρακτορτείο. «Καθώς αρχίζουμε να φέρνουμε στο σπίτι μας όλες αυτές τις “έξυπνες” συσκευές, πρέπει να αναλάβουμε και κάποια ευθύνη (για την προφύλαξή τους)» πρόσθεσε.
Among other technological "miracles" in the huge show in Las Vegas, there were baby clothes that record the baby's breathing and positioning (online parenting information), basketball balls with integrated electronic sensors, from small toothbrushes to large "white" who are talking on the internet, as well as online vital medical devices (eg pacemakers), and the increasingly "smart" cars that are now parked in the garage.

All of the above could be compromised by malicious hackers, although the threat remains mostly theoretical for now. "I don't think the 'bad guys' have yet realized the benefits to them of hacking things like this," said Katalin Kozoi, head of cybersecurity at Bitdefender. But as he warned, it is only a matter of time, perhaps even within 2014, that there will be an incident that will draw the attention of the international public to the issue. “We may see the first collateral victim, e.g. some person to be physically harmed" as he said.
Companies that produce such products, such as Unikey's "smart" Kwikset home locks, controlled online remotely, reassure their technology incorporating "military-level encryption" so they can not be hacked by hackers - people.
On the other hand, companies like Korean LG may have "smart" kitchen appliances that communicate with their owners over the internet, but the question arises as to what benefit a hacker will end up if someone else's refrigerator has been disturbed. What would he steal, beyond perhaps the e-shop with the required shopping, that would have created the "smart" refrigerator on his own?

As well as, according to the largest Cisco networking company, it is estimated that more than 50 billions of items will be interconnected online worldwide to 2020. "It's impossible to secure the cyber-security of each of these objects with special software," said David Oren.

But where there are even worse concerns, it is in the business sector and especially in the industries with all kinds of product lines. Already the protection of vital infrastructure such as oil pipelines and electricity grids, which already have a variety of online interconnections, is of great concern to governments (especially the US) and corporate administrations, as there are also, beyond the hacker, the parameters of cyber-terrorism , but also cyber-espionage.

"If I can break the security cameras of my competitor's factory, then I can see exactly how his factory works," said Hayley of Symantec. The same, obviously, is true if a hacker violates the cameras of any state establishment, throwing indiscriminate eyes on her inward parts.

Source: frapedoypoli.blogspot.gr

We thank her warmly SecTeam  @grigoris.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).