Hackers now threaten online refrigerators to "smart" toothbrushes!

89801ADAE42614334E46C9B8DE1AD0C8 Hackers now threaten online refrigerators to "smart" toothbrushes!Any device, now or in the future, has an online interface (over computers, tablets or "smartly"Mobile") is part of the ever-expanding "Internet of Things"

The hackers who have "had in the eye" computers and mobile phones sooner or later will start to turn their attention to the so-called "Internet of Things", that is to say every "smart" device connected to the Internet from its refrigerator kitchen to the bath toothbrush and the digital glasses we will wear in the future. The warning comes from cyber-security specialists on the occasion of this year's grand international CES online show in Las Vegas, USA, which was just completed and in which the Internet of Things was at the heart of this.

Anyone device, now or in the future, has an online interface (beyond computers, tablets or "smart" phones), is part of the ever-expanding "internet of things". As for the clothes, the α, οι χώροι (offices and factories), in general private and public spaces are becoming more and more "smart", so the "internet of things" will expand and its digital territory will cover an ever larger area, which will make it more and more attractive target for hackers.

«Αν ένα αντικείμενο είναι συνδεμένο στο διαδίκτυο, μπορεί κανείς να το βρει, και αν αυτό διαθέτει κάποιο λειτουργικό σύστημα, τότε μπορεί να πέσει θύμα χάκερ» δήλωσε ο Κέβιν Χέιλι, διευθυντής της εταιρείας κυβερο-ασφάλειας Symantec Security, σύμφωνα με το Γαλλικό Πρακτορτείο. «Καθώς αρχίζουμε να φέρνουμε στο σπίτι μας όλες αυτές τις “"devices, we have to take some responsibility (for their protection)" he added.
Among other technological "miracles" at the huge Las Vegas show were baby clothes that record the baby's breathing and position (updating them online ), basketballs with embedded electronic sensors, from small toothbrushes to large "white" kitchen appliances that "talk" to the internet, as well as online vital medical devices (e.g. pacemakers), as well as increasingly "smart" cars which are now parked in garages.

All of the above could be compromised by malicious hackers, although the threat remains mostly theoretical for now. "I don't think the 'bad guys' have yet realized the benefits to them of hacking things like this," said Katalin Kozoi, head of cybersecurity at Bitdefender. But as he warned, it is only a matter of time, perhaps even within 2014, that there will be an incident that will draw the attention of the international public to the issue. “We may see the first collateral victim, e.g. some person to be physically harmed" as he said.
Companies that make such products, such as Unikey's Kwikset "smart" home locks, which are remotely controlled online, reassure that their technology incorporates "military-grade ", so that it cannot be compromised by hackers-robbers.
On the other hand, companies like Korean LG may have "smart" kitchen appliances that communicate with their owners over the internet, but the question arises as to what benefit a hacker will end up if someone else's refrigerator has been disturbed. What would he steal, beyond perhaps the e-shop with the required shopping, that would have created the "smart" refrigerator on his own?

As well as, according to the largest Cisco networking company, it is estimated that more than 50 billions of items will be interconnected online worldwide to 2020. "It's impossible to secure the cyber-security of each of these objects with special software," said David Oren.

But where there are even worse concerns, it is in the business sector and especially in the industries with all kinds of product lines. Already the protection of vital infrastructure such as oil pipelines and electricity grids, which already have a variety of online interconnections, is of great concern to governments (especially the US) and corporate administrations, as there are also, beyond the hacker, the parameters of cyber-terrorism , but also cyber-espionage.

"If I can break the security cameras of my competitor's factory, then I can see exactly how his factory works," said Hayley of Symantec. The same, obviously, is true if a hacker violates the cameras of any state establishment, throwing indiscriminate eyes on her inward parts.

Source: frapedoypoli.blogspot.gr

We thank her warmly SecTeam  @grigoris.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).