The development of the Internet of Things has accelerated the process of integrating technology into life, enabling people to understand and experience intelligent life, such as home automation brought by smart homes, digitalization of cities brought by smart cities, and various smart devices have brought us to life. Great convenience. Although the outlook for the Internet of Things is optimistic, security issues are challenged.
So, how should we look at the security of the Internet of Things? "When it comes to IoT security, it not only refers to the security of devices, but also the security of networks and back-end systems. In hardware devices, smart phones and smart watches, wearable devices, smart homes and car networking are common targets. In the development of IoT devices, many vendors have not considered security issues. For example, when a home device is plugged into a TV, once attacked, the smart home can not only steal user information, but even monitor the family's every move. The car network is also used today. One of the main goals of the IoT attack. A few months ago, it was reported that Tesla was attacked by the Internet of Things.†Mei Zhengyu, vice president of Symantec's Asia Pacific major account and president of Greater China.
Smart watches and smartphones are attacked by ransomware
The Symantec Internet Security Report shows that ransomware grew by 113% last year. In the first half of this year, the ransomware spread more rapidly. And, ransomware attacks have spread from PCs to smartphones and have now expanded to smart watches.
The reason why smart watches can also be threatened by ransomware is because software synchronization between smart watches and smartphones is a breeze. If a user downloads an app on a smartphone, the smartwatch can quickly sync the app in the phone. But it also means that if a smartphone is infected with malware, it will also be quickly synced to your smart watch. The ransomware in the watch can also interrupt the normal operation of the watch and blackmail it, making it impossible for users to use the smart device.
So, what can you do to avoid being attacked by malware?
Ma Weiyan, manager of Symantec's technical support department, said that the application and firmware should be updated in a timely manner, and the application and firmware updates can patch the vulnerabilities that may have been maliciously attacked. Secondly, do not download the application at will. Nowadays, people are increasingly seeking convenience, which leads to more convenient and easy-to-use products when users choose different products with the same function. Attackers often use this mentality to place malicious code on convenient applications. If users download apps from untrusted sites, they face a significant security risk.
Smart homes face the risk of privacy breaches
Ma Weiyan said: "Smart home is now an emerging field and can be connected to the Internet. It is estimated that the number of smart homes will reach 2.9 billion in 2015 and will reach 26 billion by 2022. It is reported that parents use their home cameras to view children. Whether there is danger, but because the camera is attacked, hackers can see other devices in the home through this attack point. Therefore, in the event of security problems, smart home devices will face the risk of privacy leakage."
She believes that the speed of technology development is much faster than safety. One is because consumers' personal consciousness is indifferent, and the other is that the security awareness of developers and manufacturers is indifferent. Many R&D personnel and manufacturers have not even considered security.
Today, every household has an organic set-top box, but most people don't know how to send and receive mail in a set-top box. The data shows that in the first half of 2014, more than 100,000 malicious emails were sent to smart home devices every day. The younger generation is curious about emails in smart home devices, and often opens emails without security awareness. Device and home security will be at risk if there is a malicious attack in the mail.
There are a lot of security holes in connected cars
Ma Weiyan said that Chrysler had recalled more than 1.4 million vehicles due to major security breaches that hackers could exploit. In car networking and in-vehicle systems, CD players, OBD-II ports and wireless interfaces are attack targets.
She analyzed that smart cars such as Chrysler and Jeep were attacked, and the earliest point of invasion was the car entertainment system. The car's entertainment system is electronically run, and many times it is run by human programming code. You may think that a car is not like a computer, and it has a multi-party attack route. However, the development of a smart car is very fast. The car can connect to the mobile phone via Bluetooth and use the car phone to answer. This is a wireless path, in a small car body. There are many wireless ways. The equipment system in the car is small and the operating system is very simple. But the core principles are the same, there will be security holes.
On the other hand, as long as you need to log in, you need to authenticate the username and password. There will be a weak username and password. There will also be man-in-the-middle attacks in the enterprise network. During the communication process, the middlemen can obtain content information and can achieve the purpose by hijacking and tampering. This is a man-in-the-middle attack.
This is the same in connected cars, where an attacker can use the car and use the parts in the car. All parts of the car's brakes, throttles, etc. can be connected to the car's control system via a bus. Then, the car control system is connected to the back-end system to store the driving data into the cloud. How to prevent tampering in the communication process of the entire car and how to ensure communication security must be seriously considered.
Double Burner with Built in Hob
Gas Stove 2 Burner,Double Burner Gas Cookers,Brass Burner Stoves,Double Burner Gas Stove
xunda science&technology group co.ltd , https://www.gasstove.be