One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 225826
Date de publication 2016-10-26 08:01:00 (vue: 2016-10-26 08:01:00)
Titre Samy Kamkar hacks IoT security camera to show exploitable dangers to enterprise
Texte ForeScout Technologies released an “IoT Enterprise Risk Report” (pdf) which identified seven IoT devices that can be hacked in as little as three minutes: IP-connected security systems, smart HVACs and energy meters, VoIP phones, connected printers, video conferencing systems, smart light bulbs and smart refrigerators. Although the hack might only take a few minutes to pull off, it might take weeks to find and fix.Other “key findings” of the report include: Should any of these devices become infected, hackers can plant backdoors to create and launch an automated IoT botnet DDoS attack. Cybercriminals can leverage jamming or spoofing techniques to hack smart enterprise security systems, enabling them to control motion sensors, locks and surveillance equipment. With VoIP phones, exploiting configuration settings to evade authentication can open opportunities for snooping and recording of calls. Via connected HVAC systems and energy meters, hackers can force critical rooms (e.g. server rooms) to overheat critical infrastructure and ultimately cause physical damage. Potential scenarios for after an IoT device is hacked include using compromised smart video conferencing systems for spying via camera and microphone, disabling security cameras to allow physical break-ins, snooping on calls via VoIP phones and snagging private company information via connected printers. If an attacker were to exploit a smart light bulb, Wi-Fi credentials could be extracted and used to carry out more attacks. A smart fridge could be exploited so that an attacker obtains user credentials.To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat after allow although any article attack attacker attacks authentication automated backdoors become botnet break bulb bulbs calls camera cameras can carry cause click comment company compromised conferencing configuration connected control could create credentials critical cybercriminals damage dangers ddos device devices disabling enabling energy enterprise equipment evade exploit exploitable exploited exploiting extracted find findings” fix force forescout fridge full hack hacked hackers hacks here hvac hvacs identified include include: infected information infrastructure ins iot jamming kamkar launch leave leverage light little locks meters microphone might minutes minutes: more motion obtains off only open opportunities other out overheat pdf phones physical plant please potential printers private pull read recording refrigerators released report report” risk rooms samy scenarios security sensors server settings seven should show smart snagging snooping spoofing spying surveillance systems take techniques technologies them these three ultimately used user using video voip weeks which “iot “key
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: