Warning: Creating default object from empty value in /home/customer/www/exstreamsecurity.com/public_html/wp-content/themes/easyweb/inc/theme-options/ReduxCore/inc/class.redux_filesystem.php on line 29
How Internet of Things Pose as Cyber Threats in 2018 - Home

Cyber 360

Security Briefing from Cyber Security Experts


How Internet of Things Pose as Cyber Threats in 2018

How Internet of Things Pose as Cyber Threats in 2018

Society has become increasingly technology dependent. How many people do you know who have a smart phone or wear some sort of fitness tracker like a FitBit? Most of these devices collect, store, and provide data through internet connections. Unfortunately, this happens all too often without you necessarily knowing it. In addition, many of these devices lack basic online safety measures, which makes them susceptible to hacking. This lack of security leaves individuals increasingly vulnerable to cyber threats. Here are several threats to keep an eye on for 2018 as they related to internet of things (IOT).

Networking

With the increased connectivity associated with such devices as fitness trackers and smart phones, individuals are actually providing a network of devices that hackers can exploit. For example, the FitBit tracker has a central database that stores your step data, but also has the ability to synchronize up with other individuals who also use a FitBit. Individuals can compete against each other on a weekly basis for whoever can achieve the most steps. That connectivity can be a gateway for hackers to get not just your data, but also your friends and other users that you share FitBit data with. Additionally, since you most likely synchronize your FitBit to your phone, there is that connection that can now be exploited by a hacker.

Greater Increase in Targeted Attacks on IOT devices

Over the years, there has been an increase in cyber thieves and hackers attacking the vulnerabilities found in networked devices. Since everything from home security systems and internal house controls such as the thermostat and lighting are networked, they provide an enticing avenue for thieves to exploit. This is because many of these systems do not have basic security built in to protect the devices against online attacks. Additionally, since many of these devices do not require a password, they are literally wide open for hackers to take advantage of.

Exploiting Online Data

Recently an article came out about how FitBit tracking metadata had the potential to be exploited by cyber thieves and even terrorists. It turns out that the military had pushed an initiative that aimed at making troops more fit and healthy by providing them with fitness trackers. Recent photographs have come to light showing how FitBit metadata appears online and can show the most common routes taken by troops in specific areas. This is a prime example of online data that many users did not even know was available online.
The Internet of Things is providing more and more opportunities for cyber thieves to gain access to vulnerable systems. Given the increase in user interactions with these types of devices, it would seem we will be seeing more occurrences of cyber threats in 2018.

Share

Recommended Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Contact Us