Five ways to get rid of smart appliances and become voyeur

Consumers who use smart home appliances without considering security may attract hackers and thieves, making smart home appliances sneak mad.

Repeated research has shown that devices designed to automate homes have serious weaknesses. HP's survey of 10 off-the-shelf home security systems shows that many devices have weak password policies and are not able to guard against "man in the middle" attacks. Others have not blocked access to the device's debug interface, which may make the device vulnerable to hackers, according to a study by code security company Veracode in April.

Moreover, according to a study by security firm Synack, if an attacker can access the device, almost all devices are easily broken and become Trojan horses. In fact, as long as the researchers turn on the hardware, it takes only 5 to 20 minutes to find a way to invade each device.

A sweeping robot with a camera, a monitor that monitors children or pets at home... More and more smart home devices enter the home, and some security vulnerabilities frequently pop up. In the hands of some lawless elements, they easily invade and control these smart home appliances by cracking software or IP addresses, and point the camera to private places such as bedrooms or bathrooms to spy on personal privacy, so smart home appliances become voyeuristic.

Five ways to get rid of smart appliances and become voyeur

Even more frightening is that even behind it will form an industry chain that steals privacy. In some QQ groups, the camera cracking software and camera IP address are publicly sold, ranging from tens to hundreds of dollars. In addition to peek, there are sellers who sell sneaked private videos as porn videos.

“Technologies companies are really trying to push products into the market and really compete in the IoT space, but there isn’t a security staff on their team, so there are a lot of minor issues that have been overlooked.” Synack’s security research analyst Colby Moore said, "Most companies ignore the basic principles."

According to market research firm Gartner, global corporate security spending will reach $96.3 billion by 2018, an increase of 8% from 2017. Due to regulation, the buyer's mentality has changed, aware of emerging threats and the evolution of business strategies to digital. By 2020, more than 60% of companies will be using a variety of data security tools, such as data loss prevention, encryption and data-centric auditing and protection tools, which are rising from about 35% today.

And IDC expects global Internet of Things (IoT) spending to reach $772.5 billion in 2018, up 14.6% from the $674 billion that will be spent in 2017.

Although AppleWatch may be the most well-known device on the Internet, many of the "things" you will connect in the future will be part of your smart appliance. Unfortunately, the enthusiasm for providing home automation to users has not allowed the system to achieve the security it deserves, but has provided more attacks for cyber attackers.

Veracode's security research architect Brandon Creighton said in a statement: "We are very excited about the realization of the Internet of Things and the future development, but this does not mean that network security has become a victim in this process."

For example, security company Synack tested cameras, thermostats, smoke detectors and home automation controllers to find security holes. The company considered four scenarios that could affect consumers: hackers invaded home devices in two minutes, cell phones were stolen, eavesdropping on cafés to monitor victims through the network, and more advanced hackers before victims buy Successfully modified smart home appliances.

Every device has a security flaw. For example, consumers want to control their homes through smartphones, which means that losing equipment can have a major impact on home security. In addition, many products do not use encryption technology.

“I have to say that I am shocked and very, very shocking,” Moore said.

For those who are on the journey of home automation, here are some of the easiest steps to keep smart homes from being sneaky.

Five ways to get rid of smart appliances and become voyeur

Lock the router

A router is a digital channel for the home, and a router with a low security factor makes it easy for network attackers to access all the smart appliances in your network. For example, in June of this year, Ms. Hu of Hangzhou found that her home camera was not operating and she was moving. She logged into the mobile client and found that only one of her users' cameras was bound, and two users were watching online at the same time. At the beginning of August this year, when Ms. Huang of Chongqing used her home camera, she also found that the camera mounted on the ceiling rotated itself. She used the computer to view the background and found that in addition to her own account, another stranger was watching this camera.

Users should invest in a router with a good security record, ensure that the default administrative password has changed, and run the current firmware.

Prevent tampering equipment

According to security firm Synack, using smart appliances for two minutes did not give the attacker enough windows to modify the device. However, devices with a USB update mechanism are susceptible to rapid intrusion.

Home users should place the device in a location that is not easily accessible to others, with special emphasis on devices that have a management port.

Five ways to get rid of smart appliances and become voyeur

Use cloud services

Cloud services are designed to help consumers manage home automation devices, such as Vivint, ADT, or similar service providers, which typically cost money and, if not properly protected, can lead to privacy and security issues. However, in most cases, service providers are better able to protect services than home users. If you do not use cloud services, you will be responsible for checking the security of your system.

Therefore, consumers can spend a certain price and choose a reliable cloud service provider to make their home automation more convenient and safer. However, users do need to choose complex passwords and should ask for two-factor authentication, which adds another layer of security to the access account.

Update device

Relatively speaking, many developers who develop software for home automation products are new to security. David Jacoby, a security analyst at KasperskyLab, tried to invade his own home and found some simple vulnerabilities in his home storage products.

“The developers have an excuse to say that they are not security personnel,” he said. “But we need to let vendors fix the vulnerabilities they know.”

He said that because security features need to be improved, application updates are a critical step in ensuring that home automation devices remain safe in the simplest attacks.

Choose a famous brand

A company that has just set foot in smart home appliances will not take the safety of their products seriously. Synack's Moore says consumers should focus on companies that are committed to product and product safety.

"Of course, you will be more likely to be a person with a reputation," he said. "At least they will stand behind their products and keep rolling out updates."

All In One PC

All in one pc is a new trend for desktop type computer nowadays. What you can see at this store is Custom All In One PC. There are 19 inch all in one pc, 21.5 All In One PC, All In One PC 23.8 Inch and 27 inch all in one pc, which are the main sizes at the market. How to choose the most suitable one for special application? According to clients` feedback, 19.1 inch entry level, 21.5 inch middle and low level, 23.8 or 27 inch higher level-All In One PC I7. Some clients may worry the heat-releasing since equipped releasing fan into the back of monitor, see no releasing fences on back cover. However, totally no need worry that point, cause special back cover material and releasing holes can meet the demand of heat releasing.

You can see All In One Business Computer, All In One Gaming PC, and All In One Desktop Touch Screen series at this shop.

Any other unique design or parameters, just feel free to contact us so that can get right and value information quickly.

Believe will try our best to support you!


All In One PC,All In One Pc I7,Custom All In One Pc,All In One Pc 23.8 Inch,21.5 All In One Pc

Henan Shuyi Electronics Co., Ltd. , https://www.shuyicustomlaptop.com